16 resultados para privacy violations

em Universidade do Minho


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the problem of privacy-preserving proofs on authenticated data, where a party receives data from a trusted source and is requested to prove computations over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source — even without having access to that source. This problem is motivated by various scenarios emerging from several application areas such as wearable computing, smart metering, or general business-to-business interactions. Furthermore, these applications also demand any meaningful solution to satisfy additional properties related to usability and scalability. In this paper, we formalize the above three-party model, discuss concrete application scenarios, and then we design, build, and evaluate ADSNARK, a nearly practical system for proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state-of-the-art solutions for this model. For instance, compared to corresponding solutions based on Pinocchio (Oakland’13), ADSNARK achieves up to 25× improvement in proof-computation time and a 20× reduction in prover storage space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The number of houses damaged or destroyed after disasters is frequently large, and re-housing of homeless people is one of the most important tasks of reconstruction programmes. Reconstruction works often last long and during that time, it is essential to provide victims with the minimum conditions to live with dignity, privacy, and protection. This research intends to demonstrate the crucial role of temporary accommodation buildings to provide spaces where people can live and gradually resume their life until they have a permanent house. The study also aims to identify the main problems of temporary accommodation strategies and to discuss some principles and guidelines in order to reach better design solutions. It is found that temporary accommodation is an issue that goes beyond the simple provision of buildings, since the whole space for temporary settlement is important. Likewise, temporary accommodation is a process that should start before a disaster occurs, as a preventive pre-planning. In spite of being temporary constructions, these housing buildings are one of the most important elements to provide in emergency scenarios, contributing for better recovery and reconstruction actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado em Engenharia Informática

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction of technologies in the workplace have led to a dramatic change. These changes have come with an increased capacity to gather data about one’s working performance (i.e. productivity), as well as the capacity to track one’s personal responses (i.e. emotional, physiological, etc.) to this changing workplace environment. This movement of self-monitoring or self-sensing using diverse types of wearable sensors combined with the use of computing has been identified as the Quantified-Self. Miniaturization of sensors, reduction in cost and a non-stop increase in the computer power capacity has led to a panacea of wearables and sensors to track and analyze all types of information. Utilized in the personal sphere to track information, a looming question remains, should employers use the information from the Quantified-Self to track their employees’ performance or well-being in the workplace and will this benefit employees? The aim of the present work is to layout the implications and challenges associated with the use of Quantified-Self information in the workplace. The Quantified-Self movement has enabled people to understand their personal life better by tracking multiple information and signals; such an approach could allow companies to gather knowledge on what drives productivity for their business and/or well-being of their employees. A discussion about the implications of this approach will cover 1) Monitoring health and well-being, 2) Oversight and safety, and 3) Mentoring and training. Challenges will address the question of 1) Privacy and Acceptability, 2) Scalability and 3) Creativity. Even though many questions remain regarding their use in the workplace, wearable technologies and Quantified-Self data in the workplace represent an exciting opportunity for the industry and health and safety practitioners who will be using them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Measurements of the centrality and rapidity dependence of inclusive jet production in sNN−−−√=5.02 TeV proton--lead (p+Pb) collisions and the jet cross-section in s√=2.76 TeV proton--proton collisions are presented. These quantities are measured in datasets corresponding to an integrated luminosity of 27.8 nb−1 and 4.0 pb−1, respectively, recorded with the ATLAS detector at the Large Hadron Collider in 2013. The p+Pb collision centrality was characterised using the total transverse energy measured in the pseudorapidity interval −4.9<η<−3.2 in the direction of the lead beam. Results are presented for the double-differential per-collision yields as a function of jet rapidity and transverse momentum (pT) for minimum-bias and centrality-selected p+Pb collisions, and are compared to the jet rate from the geometric expectation. The total jet yield in minimum-bias events is slightly enhanced above the expectation in a pT-dependent manner but is consistent with the expectation within uncertainties. The ratios of jet spectra from different centrality selections show a strong modification of jet production at all pT at forward rapidities and for large pT at mid-rapidity, which manifests as a suppression of the jet yield in central events and an enhancement in peripheral events. These effects imply that the factorisation between hard and soft processes is violated at an unexpected level in proton--nucleus collisions. Furthermore, the modifications at forward rapidities are found to be a function of the total jet energy only, implying that the violations may have a simple dependence on the hard parton--parton kinematics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study used event-related potentials to examine interactions between mood, sentence context, and semantic memory structure in schizophrenia. Seventeen male chronic schizophrenia and 15 healthy control subjects read sentence pairs after positive, negative, or neutral mood induction. Sentences ended with expected words (EW), within-category violations (WCV), or between-category violations (BCV). Across all moods, patients showed sensitivity to context indexed by reduced N400 to EW relative to both WCV and BCV. However, they did not show sensitivity to the semantic memory structure. N400 abnormalities were particularly enhanced under a negative mood in schizophrenia. These findings suggest abnormal interactions between mood, context processing, and connections within semantic memory in schizophrenia, and a specific role of negative mood in modulating semantic processes in this disease.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de mestrado integrado em Engenharia e Gestão de Sistemas de Informação

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de mestrado em Enfermagem da Pessoa em Situação Crítica

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Doctoral Thesis in Juridical Sciences (Specialty in Public Legal Sciences)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese de Doutoramento em Psicologia - Especialidade em Psicologia Social

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de mestrado em Direitos Humanos

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de mestrado em Direito e Informática