5 resultados para Protection of Privacy

em AMS Tesi di Laurea - Alm@DL - Università di Bologna


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The importance of vernacular architecture as an integral part of our cultural heritage is often undervalued, and the management of rural constructions of heritage value often requires the application of more flexible and adjusted preservation principles compared to monumental assets. For vernacular architecture, the preservation and consolidation concern not only their physical substance but also their intangible values and purpose in society. More than other heritage values, the vernacular raises the question of prospective functions it can fulfill in contemporary societies without undermining its legacy. This work analyzes the topic by studying the case study of the dry docks on the Balearic Island of Formentera, including abundant documentation of traditional construction techniques and materials realized through a field study, followed by the assessment of threats to and opportunities for vernacular architecture on Formentera, closing with suggestions for the maintenance and potential functions of the dry docks. For this, a comparative case study was introduced: the capanni da pesca at the Adriatic coast of Italy. The suggestions focus on the importance of maintenance for rural heritage, expressed through the creation of a guide for owners of protected dry docks highlighting good and bad practice examples and recurrent works of care. Furthermore, the thesis seeks to raise awareness for the significance of landscape and social factors in the discourse about vernacular heritage sites. Ultimately, different outlines of tourism development are proposed. The idea is to explore rural and sustainable tourism as a tool for territory development and enhancement of the cultural heritage value by helping to prevent the destination's decline through careful evaluation of its limits of acceptable change and identifying beneficial, sustainable scenarios for the future of the heritage asset and the respective community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Tesi tratta i concetti di Privacy e Protezione dei Dati personali, contestualizzandone il quadro normativo e tecnologico con particolare riferimento ai contesti emergenti rappresentati – per un verso – dalla proposta di nuovo Regolamento generale sulla protezione dei dati personali (redatto dal Parlamento Europeo e dal Consiglio dell’Unione Europea), – per un altro – dalla metodologia di progettazione del Privacy by Design e – per entrambi – dalla previsione di un nuovo attore: il responsabile per la protezione dei dati personali (Privacy Officer). L’elaborato si articola su tre parti oltre introduzione, conclusioni e riferimenti bibliografici. La prima parte descrive il concetto di privacy e le relative minacce e contromisure (tradizionali ed emergenti) con riferimento ai contesti di gestione (aziendale e Big Data) e al quadro normativo vigente. La seconda Parte illustra in dettaglio i principi e le prassi del Privacy by Design e la figura del Privacy Officer formalmente riconosciuta dal novellato giuridico. La terza parte illustra il caso di studio nel quale vengono analizzate tramite una tabella comparativa minacce e contromisure rilevabili in un contesto aziendale.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In the current study, we analyze the effectiveness of an organosilane compound, 3-mercapto-propyl-tri-methoxy-silane (abbreviated PropS-SH), in the corrosion protection of fire-gilded bronzes. Firstly, the coating was applied on as-gilded bronze. Subsequently, it was also applied on pre-patinated bronze, because the substrate on which protective coatings are applied in real conservation interventions are corroded artifacts (cleaning procedures never remove all the corrosion products). Aiming to obtain results that simulate the situation of real artifacts, a dropping test that simulates outdoor exposure in runoff conditions (unsheltered areas of monuments) was employed in order to prepatinate the gilded bronze samples, which are the substrate for applying the protective coating. The preparation of the samples by applying the protective coating was performed in collaboration with the Corrosion Studies Centre “Aldo Daccò” from Ferrara University. After the artificial exposure cycles the samples underwent investigations through a variety of spectroscopic methods including SEM, Raman, FIB, AAS and color measurements. In order to evaluate the possible removal of the organosilane coating, protected samples were subjected to laser cleaning tests and characterized by SEM/EDS so as to assess the changes in composition and morphology of the treated surfaces. The laser cleaning treatment was performed at the Institute of Applied Physics “Nello Carrara” (CNR Sesto Fiorentino (FI)). The morphology and chemical composition of the samples was observed before and after the operation in order to obtain information about the fluence and type of laser which are best suited to the removal of this type of coating.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cloud services are becoming ever more important for everyone's life. Cloud storage? Web mails? Yes, we don't need to be working in big IT companies to be surrounded by cloud services. Another thing that's growing in importance, or at least that should be considered ever more important, is the concept of privacy. The more we rely on services of which we know close to nothing about, the more we should be worried about our privacy. In this work, I will analyze a prototype software based on a peer to peer architecture for the offering of cloud services, to see if it's possible to make it completely anonymous, meaning that not only the users using it will be anonymous, but also the Peers composing it will not know the real identity of each others. To make it possible, I will make use of anonymizing networks like Tor. I will start by studying the state of art of Cloud Computing, by looking at some real example, followed by analyzing the architecture of the prototype, trying to expose the differences between its distributed nature and the somehow centralized solutions offered by the famous vendors. After that, I will get as deep as possible into the working principle of the anonymizing networks, because they are not something that can just be 'applied' mindlessly. Some de-anonymizing techniques are very subtle so things must be studied carefully. I will then implement the required changes, and test the new anonymized prototype to see how its performances differ from those of the standard one. The prototype will be run on many machines, orchestrated by a tester script that will automatically start, stop and do all the required API calls. As to where to find all these machines, I will make use of Amazon EC2 cloud services and their on-demand instances.