2015
DOI: 10.1007/978-3-319-17016-9
|View full text |Cite
|
Sign up to set email alerts
|

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance

Abstract: Abstract. Present malicious threats have been consolidated in past few years by incorporating diverse stealthy techniques. Detecting these malwares on the basis of their dynamic behavior has become a potential approach as it suppresses the shortcomings of static approaches raised due to the obfuscated malware binaries. Additionally, existing behavior based malware detection approaches are resilient to zero-day malware attacks. These approaches rely on isolated analysis environment to monitor and capture the ru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Bitcoin, on the other hand, is less cumbersome as the transaction is carried out directly between users with no involvement of a third party or external agency (Herrera-joancomart, 2015). According to its founder, (Nakamoto, 2008), Bitcoin gained immense popularity due to its high level of perceived security.…”
Section: Current Payment Systems and Bitcoinmentioning
confidence: 99%
See 1 more Smart Citation
“…Bitcoin, on the other hand, is less cumbersome as the transaction is carried out directly between users with no involvement of a third party or external agency (Herrera-joancomart, 2015). According to its founder, (Nakamoto, 2008), Bitcoin gained immense popularity due to its high level of perceived security.…”
Section: Current Payment Systems and Bitcoinmentioning
confidence: 99%
“…In order to increase financial privacy, owners can generate new addresses for each Bitcoin transaction (Brito & Castillo, 2013). Each transaction requires a single passphrase, which could help in tracking all transactions made by a single owner (Herrera-joancomart, 2015). This helps in securing the user's identity as the public is unable to identify which transactions are made.…”
Section: User Perception Of Bitcoin Securitymentioning
confidence: 99%
“…Provenance can be created by software in a specific physical, digital or application resource or can refer to an audit process that is operated on data created purely for the provenance information (Shetty et al, 2017). As such, the establishment of trust and confidence around data artefacts is ensured through the use of data-provenance systems (Garcia-Alfaro et al, 2015). Such systems provide information on different stages ranging from data creation and updates alongside the parties that have initiated the process and the origin of the data at different stages of the life cycle including the alteration of the data with the actors involved.…”
Section: Provenance Models -Issue Status and Blockchainmentioning
confidence: 99%
“…A-PPL [50] is a policy language for expressing accountability obligations. A-PPL can be used for privacy management policies, access control, and usage control policies.…”
Section: Expression Language Of Insurance Policiesmentioning
confidence: 99%