Search Results

1 - 9 of 9 items :

  • "European Union" x
  • IT-Security and Cryptology x
Clear All
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps

/ACM 1st International Workshop on, pages 2-7, May 2015. [12] Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. Automated Test Input Generation for Android: Are We There Yet?(E). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 429-440. IEEE, 2015. [13] Fred Chung. Custom Class Loading in Dalvik. http: //android-developers.blogspot.it/2011/07/custom-classloading- in-dalvik.html. [14] Court of Justice of the European Union. The court of justice declares that the

Open access
4 Years of EU Cookie Law: Results and Lessons Learned

Abstract

Personalized advertisement has changed the web. It lets websites monetize the content they offer. The downside is the continuous collection of personal information with significant threats to personal privacy. In 2002, the European Union (EU) introduced a first set of regulations on the use of online tracking technologies. It aimed, among other things, to make online tracking mechanisms explicit to increase privacy awareness among users.

Amended in 2009, the EU Directive mandates websites to ask for informed consent before using any kind of profiling technology, e.g., cookies. Since 2013, the ePrivacy Directive became mandatory, and each EU Member State transposed it in national legislation. Since then, most of European websites embed a “Cookie Bar”, the most visible effect of the regulation.

In this paper, we run a large-scale measurement campaign to check the current implementation status of the EU cookie directive. For this, we use CookieCheck, a simple tool to automatically verify legislation violations. Results depict a shady picture: 49 % of websites do not respect the Directive and install profiling cookies before any user’s consent is given.

Beside presenting a detailed picture, this paper casts lights on the difficulty of legislator attempts to regulate the troubled marriage between ad-supported web services and their users. In this picture, online privacy seems to be continuously at stake, and it is hard to reach transparency.

Open access
Access Denied! Contrasting Data Access in the United States and Ireland

://www.cint.com/about [Accessed: 06- Apr- 2015]. [19] M. Cogley. Of course Facebook would go to a country with the lowest levels of data protection, 2015. http://www.newstalk.com/Of-course-Facebook-would-go-to-a-countrywith- the-lowest-levels-of-data-protection- [Accessed: 20- Jul- 2015]. [20] Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015, 2015. https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/cpbr-act-of-2015-discussion-draft.pdf [Accessed: 15- Jun- 2015]. [21] Council of the European Union

Open access
SecureNN: 3-Party Secure Computation for Neural Network Training

free movement of such data, and repealing Directive 95/46/EC (GDPR). Official Journal of the European Union , L119, May 2016. [6] Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. High-throughput semi-honest secure three-party computation with an honest majority. In ACM CCS , 2016. [7] Donald Beaver. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference , pages 420–432. Springer, 1991. [8] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for

Open access
Constructing elastic distinguishability metrics for location privacy

1 This work was partially supported by the European Union 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS. References [1] https://github.com/paracetamolo/elastic-mechanism . [2] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013. [3] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection

Open access
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering

References [1] European Parliament and Council of the European Union, “Directive 2006/32/ec of the european parliament and of the council,” 2006. [2] G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE , vol. 80, no. 12, pp. 1870–1891, 1992. [3] H. Lam, G. Fung, and W. Lee, “A novel method to construct taxonomy electrical appliances based on load signatures of,” IEEE Transactions on Consumer Electronics , vol. 53, no. 2, pp. 653–660, 2007. [4] U. Greveler, B. Justus, and D. Loehr, “Forensic content detection

Open access
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)

Processing of Personal Data and on the Free Movement of Such Data, 1995. [11] European Parliament. Regulation 2016/679 of the European Parliament and the Council of the European Union of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016. [12] Federal Aviation Administration. Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI), 2011

Open access
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

. Ioannidis. Meta-Analysis Methods for Genome-Wide Association Studies and Beyond. Nature Reviews Genetics , 14(6):379–389, 2013. [EN14] Y. Erlich and A. Narayanan. Routes for Breaching and Protecting Genetic Privacy. Nature Reviews Genetics , 15(6):409–421, 2014. [Eur16] European Parliament and Council of European Union. General Data Protection Regulation. Official Journal of the European Union , L119:1–88, May 2016. [FLJ + 14] M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart. Privacy in Pharmacogenetics: An Endto-End Case Study of

Open access
Privacy vs. Reward in Indoor Location-Based Services

. [7] D. P. D. Farias and N. Megiddo, “Combining expert advice in reactive environments,” J. ACM, vol. 53, no. 5, pp. 762-799, Sep. 2006. [Online]. Available: http://doi.acm.org/10.1145/1183907.1183911 [8] Apple Support, “iOS: Understanding iBeacon,” https://support.apple.com/en-gb/HT202880, Feb. 2015. [9] R. Rodrigues, D. Barnard-Wills, D. Wright, P. De Hert, V. Papakonstantinou, L. Beslay, E. JRC-IPSC, N. Dubois, and E. JUST, “EU privacy seals project,” Publications Office of the European Union, 2013. [10] P. Higgins

Open access