Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Western University

Privacy

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling Dec 2020

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling

Electronic Thesis and Dissertation Repository

In this thesis centralized, decentralized, Bluetooth, and GPS based applications of digital contact tracing were reviewed and assessed. Using privacy principles created by a contingent of security and privacy experts from across Canada, a metric of assessing an application’s privacy was created. An attack tree was built to assess the security of the contact tracing applications. Eighteen attacks were theorized against contact tracing applications currently in use. An application’s vulnerability to the attacks was measured using a scoring system developed for this purpose. The results of the security scores were used to create a metric for assessing the security of …


Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr. Dec 2014

Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.

Electrical and Computer Engineering Publications

Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.


Protecting Personal Private Information In Collaborative Environments, David S. Allison Jun 2014

Protecting Personal Private Information In Collaborative Environments, David S. Allison

Electronic Thesis and Dissertation Repository

The ability to collaborate has always been vitally important to businesses and enterprises. With the availability of current networking and computing power, the creation of Collaborative Working Environments (CWEs) has allowed for this process to occur anytime over any geographical distance. Sharing information between individuals through collaborative environments creates new challenges in privacy protection for organizations and the members of organizations. This thesis confronts the problems when attempting to protect the personal private information of collaborating individuals.

In this thesis, a privacy-by-policy approach is taken to addressing the issue of protecting private information within collaborative environments. A privacy-by-policy approach to …


Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David S. Allison, Miriam Am Capretz, Hany F. Elyamany, Shuying Wang Mar 2012

Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David S. Allison, Miriam Am Capretz, Hany F. Elyamany, Shuying Wang

Electrical and Computer Engineering Publications

Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can …


Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Zuquim Guimaraes Garcia Aug 2011

Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Zuquim Guimaraes Garcia

Electronic Thesis and Dissertation Repository

Privacy can be defined as the right of an individual to have information about them accessed and used in conformity with what they consider acceptable. Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. A solution for this problem must include features that support privacy preservation in each area of SOA. This thesis focuses on the areas of service description and discovery. The problems in these areas are that currently it is not possible to describe how a service provider deals with information received from a service consumer as well as discover a service that satisfies the privacy preferences …


Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz Jan 2011

Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz

Electrical and Computer Engineering Publications

The evolution of Cloud Computing as a viable business solution for providing hardware and software has created many security concerns. Among these security concerns, privacy is often overlooked. If Cloud Computing is to continue its growth, this privacy concern will need to be addressed. In this work we discuss the current growth of Cloud Computing and the impact the public sector and privacy can have in furthering this growth. To begin to provide privacy protection for Cloud Computing, we introduce privacy constraints that outline privacy preferences. We propose the expansion of Cloud Service Level Agreements (SLAs) to include these privacy …