![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Book
-
Chapter
DRM for Protecting Personal Content
Privacy is becoming a serious concern in the connected world. This chapter presents privacy issues, requirements and privacy protection concepts related to consumers’ private content. First, privacy issues and...
-
Chapter
Privacy and Security Issues in a Digital World
This chapter reviews the most important security and privacy issues of the modern digital world, emphasizing the issues brought by the concept of ambient intelligence. Furthermore, the chapter explains the org...
-
Chapter
Enhancing Privacy for Digital Rights Management
This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in th...
-
Book and Conference Proceedings
-
Chapter and Conference Paper
Towards Trustworthy Health Platform Cloud
To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...
-
Book and Conference Proceedings
-
Chapter and Conference Paper
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler
This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...
-
Chapter and Conference Paper
Hunting the Unknown
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...
-
Chapter and Conference Paper
Data Leakage Quantification
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of p...