Search Engines Tackle the Desktop
Computer
MyLifeBits: a personal database for everything
Communications of the ACM - Personal information management
ZigBee-to-Internet Interconnection Architectures
ICONS '07 Proceedings of the Second International Conference on Systems
New Techniques for Private Stream Searching
ACM Transactions on Information and System Security (TISSEC)
Digraphs: Theory, Algorithms and Applications
Digraphs: Theory, Algorithms and Applications
Supporting privacy preferences in credential-based interactions
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Optimizing Deep Packet Inspection for High-Speed Traffic Analysis
Journal of Network and Systems Management
Journal of Network and Systems Management
Objective Risk Evaluation for Automated Security Management
Journal of Network and Systems Management
Ultra-wideband Positioning Systems: Theoretical Limits, Ranging Algorithms, and Protocols
Ultra-wideband Positioning Systems: Theoretical Limits, Ranging Algorithms, and Protocols
SudoWeb: minimizing information disclosure to third parties in single sign-on platforms
ISC'11 Proceedings of the 14th international conference on Information security
Electronic retention: what does your mobile phone reveal about you?
International Journal of Information Security
SenseCam: a retrospective memory aid
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Ultra-wideband radio technology: potential and challenges ahead
IEEE Communications Magazine
Insider threat mitigation: preventing unauthorized knowledge acquisition
International Journal of Information Security - Special Issue: Supervisory control and data acquisition (SCADA)
Efficient microaggregation techniques for large numerical data volumes
International Journal of Information Security - Special Issue: Supervisory control and data acquisition (SCADA)
Key Technologies and Applications of Internet of Things
ICICTA '12 Proceedings of the 2012 Fifth International Conference on Intelligent Computation Technology and Automation
Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications
Journal of Network and Systems Management
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
The so called trend ''live digital, remember digital'' is acquiring higher relevance within the international research community, due to its several appealing challenges in a multitude of different fields within the Information and Communication Technologies. Today, many people live daily connected to the Internet through their mobile phones, laptops, tablets, etc. and the need to audit or log every single digital interaction emerges in many environments. By seamlessly recording those digital interactions and storing them in a privacy-preserving fashion, a number of benefits are brought to end users, like the provision of user-tailored services, amongst many others. In this paper we will particularly focus on the study of the security and privacy challenges within this field, as well as on the analysis of the currently existing solutions addressing these issues and we will propose an architecture for the so called live digital systems.