Privacy and data protection in a user centric business model for telecommunications services

被引:0
|
作者
Yelmo, Juan C. [1 ]
Del AÁlamo, Joseé M. [1 ]
Trapero, Rubeén [1 ]
机构
[1] DIT, Universidad Politecnica de Madrid, Ciudad Universitaria sin, Madrid,28040, Spain
关键词
All Open Access; Bronze;
D O I
暂无
中图分类号
学科分类号
摘要
Data privacy
引用
收藏
页码:447 / 461
相关论文
共 50 条
  • [31] From data flows to privacy-benefit trade-offs: A user-centric semantic model
    Lu, Yang
    Li, Shujun
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [32] Improving Privacy and Security of User Data in Location Based Services
    Yamin, Mohammad
    Sen, Adnan Ahmed Abi
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2018, 9 (01) : 19 - 42
  • [33] Clustering Approach for User Location Data Privacy in Telecommunication Services
    Vukovic, Marin
    Kordic, Mario
    Jevtic, Dragan
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1459 - 1463
  • [34] Privacy Protection Model for Location-Based Services
    Ni, Lihao
    Liu, Yanshen
    Liu, Yi
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (01): : 96 - 112
  • [35] User-centric data querying for location-based services
    Katasonov, A
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 97 - 105
  • [36] Self-service Privacy: User-Centric Privacy for Network-Centric Identity
    del Alamo, Jose M.
    Monjas, Miguel A.
    Yelmo, Juan C.
    San Miguel, Beatriz
    Trapero, Ruben
    Fernandez, Antonio M.
    TRUST MANAGEMENT IV, 2010, 321 : 17 - +
  • [37] A Data-Centric Approach for Privacy-Aware Business Process Enablement
    Short, Stuart
    Kaluvuri, Samuel Paul
    ENTERPRISE INTEROPERABILITY, 2011, 76 : 191 - 203
  • [38] Novel user-centric model for m-business transformation
    Chan, JC
    Hoang, DB
    ICMB 2005: International Conference on Mobile Business, 2005, : 3 - 8
  • [39] Internet user perception on data privacy protection: Big data analytics on twitter
    Soonthornphisaj, Nuanwan
    Tuomchomtam, Sarach
    Frontiers in Artificial Intelligence and Applications, 2019, 320 : 170 - 180
  • [40] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93