Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Electrical and Computer Engineering

Western University

Privacy

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Electrical and Computer Engineering

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling Dec 2020

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling

Electronic Thesis and Dissertation Repository

In this thesis centralized, decentralized, Bluetooth, and GPS based applications of digital contact tracing were reviewed and assessed. Using privacy principles created by a contingent of security and privacy experts from across Canada, a metric of assessing an application’s privacy was created. An attack tree was built to assess the security of the contact tracing applications. Eighteen attacks were theorized against contact tracing applications currently in use. An application’s vulnerability to the attacks was measured using a scoring system developed for this purpose. The results of the security scores were used to create a metric for assessing the security of …


Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Zuquim Guimaraes Garcia Aug 2011

Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Zuquim Guimaraes Garcia

Electronic Thesis and Dissertation Repository

Privacy can be defined as the right of an individual to have information about them accessed and used in conformity with what they consider acceptable. Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. A solution for this problem must include features that support privacy preservation in each area of SOA. This thesis focuses on the areas of service description and discovery. The problems in these areas are that currently it is not possible to describe how a service provider deals with information received from a service consumer as well as discover a service that satisfies the privacy preferences …