Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy Policy
biblio
PrivacyCheck's Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
PrivacyCheck
Usable Privacy
tools
Software
Scalability
pubcrawl
Privacy Policy
Privacy Policies
privacy enhancing technologies
browser extension
privacy
PET
Organizations
machine learning
Intelligent Agents
Human behavior
competitor analysis
Browsers
biblio
Contextual Privacy Policy Modeling in IoT
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
IoT Privacy Taxonomy
taxonomy
smart buildings
Scalability
pubcrawl
Privacy Policy
Privacy Policies
Privacy Formalization
privacy
Context
IoT
Internet of Things
Intelligent sensors
Human behavior
data privacy
Cyberspace
cyber-physical systems
Context modeling
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
An Interface Without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese
Submitted by aekwall on Mon, 11/11/2019 - 10:48am
security
Scalability
Human behavior
pubcrawl
privacy
Privacy Policies
Privacy Policy
Interaction design
terms of service
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 10:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
I Read but Don'T Agree: Privacy Policy Benchmarking Using Machine Learning and the EU GDPR
Submitted by aekwall on Mon, 11/11/2019 - 10:47am
Scalability
Human behavior
pubcrawl
privacy
Privacy Policies
data protection regulation
Privacy Policy
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 11:39am
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
Graph-Based Data-Collection Policies for the Internet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
Category-Based Data Collection
composability
Human behavior
Internet of Things
Metrics
policy analysis
policy-based governance
Policy Visualisation
Privacy Policy
pubcrawl
Security Policies Analysis
Smart Grid Privacy
1
2
3
next ›
last »