Proceedings of the 26th Pan-Hellenic Conference on Informatics 2022
DOI: 10.1145/3575879.3575968
|View full text |Cite
|
Sign up to set email alerts
|

Self-Adaptive Privacy in Cloud Computing: An overview under an interdisciplinary spectrum

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…In the context of self-adaptive privacy, these systems need to adhere to various laws and regulations to ensure that users' personal data and information are handled appropriately. The emphasis on compliance mechanisms provided by cloud providers suggests an approach to meeting regulatory requirements [5]. The system should be designed in a flexible form to adapt to changes in privacy laws and regulations.…”
Section: Tr-1 Compliance Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of self-adaptive privacy, these systems need to adhere to various laws and regulations to ensure that users' personal data and information are handled appropriately. The emphasis on compliance mechanisms provided by cloud providers suggests an approach to meeting regulatory requirements [5]. The system should be designed in a flexible form to adapt to changes in privacy laws and regulations.…”
Section: Tr-1 Compliance Managementmentioning
confidence: 99%
“…In particular, self-adaptive privacy mechanisms empower users to exert granular control over their personal data by allowing them to dynamically adjust privacy settings based on changing preferences, contexts, and risk levels. This level of control is essential in cloud environments where data may be shared across multiple applications and services, each of which has its own privacy requirements [5]. What is more, self-adaptive privacy solutions leverage contextual information such as user location, device type, and network conditions to dynamically adapt privacy protections in real time.…”
Section: Introductionmentioning
confidence: 99%