Refine
Year of publication
- 2018 (135) (remove)
Document type
- Conference Proceeding (135) (remove)
Keywords
- Poster (4)
- Attribute based access control (2)
- Authorization (2)
- Classification (2)
- Dementia (2)
- Industrie 4.0 (2)
- Industry 4.0 (2)
- Internet of things (2)
- Non-intrusive load monitoring (2)
- Porous silicon (2)
- REST (2)
- Reminiscence therapy (2)
- Requirements engineering (2)
- Software systems (2)
- Stakeholders (2)
- Sustainable development (2)
- ALD (1)
- Access control (1)
- Active MEA (1)
- Adaptation models (1)
- Adaptive systems (1)
- Agile method (1)
- Angular position (1)
- Artificial intelligence (1)
- Automated driving (1)
- Autorisierung (1)
- Balliscardiography (1)
- Big data frameworks (1)
- Bioamplifier (1)
- Bridge circuits (1)
- Business process management (1)
- CMCs (1)
- CMOS‐MEAs (1)
- Cameras (1)
- Capacitive energy harvesting (1)
- Chip in foil (1)
- Cloud computing (1)
- Collision avoidance systems (1)
- Color (1)
- Communication systems (1)
- Computer science (1)
- Conferences (1)
- Contactless sensing (1)
- Context (1)
- Context enhancement protocol (1)
- Control systems (1)
- Couplings (1)
- Customer experience (1)
- Data protection (1)
- Data sovereignty (1)
- Databases (1)
- Decision making (1)
- Decision support systems (1)
- Decision trees (1)
- Digital transformation (1)
- Digitization (1)
- Domain analysis provisioner (1)
- Dressing (1)
- Driver monitoring (1)
- Driver’s action detection (1)
- Driving behaviour (1)
- Driving simulator study (1)
- Drop-out rate (1)
- Economic indicators (1)
- Economics (1)
- Elastic drive shafts (1)
- Electret (1)
- Electrical impedance tomography (1)
- Energy harvesting (1)
- Event detection (1)
- Evolutionary strategy (1)
- Explosive porous silicon (1)
- Factory of the future (1)
- Feature exrtraction (1)
- Feature extraction (1)
- Feed forward neural net (1)
- Female researchers (1)
- Fertigung (1)
- Frequency independent transformation of periodic signals (1)
- Fun moments (1)
- Fuzzy Logic (1)
- Fuzzy logic (1)
- Gas sensor (1)
- Gesture interaction (1)
- Grinding (1)
- Grinding tool life (1)
- Grinding wheel wear (1)
- Hafnium dioxide (1)
- Hagelabwehr (1)
- Hearing aid use (1)
- Hearing impairment (1)
- High speed high efficiency grinding (1)
- Human hazard perception (1)
- Image color analysis (1)
- Image processing (1)
- Immersive service prototyping (1)
- Industrial internet of things (1)
- Integral control (1)
- Intertemporal choice (1)
- Interviews (1)
- IoT Apps (1)
- Ions (1)
- Joyful (1)
- LED (1)
- Laser-structure (1)
- Legal conformity (1)
- MOSFET (1)
- Machine learning (1)
- Machine maintenance (1)
- Mathematical model (1)
- Mechanical engineering (1)
- Memory triggering (1)
- Mesomanufacturing (1)
- Mobile apps (1)
- Model-driven architecture (1)
- Model-driven development (1)
- NILM dataset (1)
- Nachhaltigkeit (1)
- Natural user interfaces (1)
- Naturalistic (1)
- Neural networks (1)
- Non-driving related tasks classification (1)
- Operating systems (1)
- Optical link (1)
- Optical spectroscopy (1)
- Optimization (1)
- POF (1)
- Photoacoustic sensor (1)
- Photobiomodulation (1)
- Photonic crystal (1)
- Photonic crystal (1)
- Photovoltaic systems (1)
- Poster presentation (1)
- Privacy (1)
- Privacy Preferences Elicitation (1)
- Privacy enhancing technologies (1)
- Process model (1)
- Product development (1)
- Protocols (1)
- Recommender systems (1)
- Resists (1)
- Resonance points (1)
- Reusable architectural patterns (1)
- Rule-based-security (1)
- Schottky diodes (1)
- Security (1)
- Security Zertifikat (1)
- Segmented wheel (1)
- Sensitivity analysis (1)
- Sensor network (1)
- Service design (1)
- Service development (1)
- Service engineering (1)
- Service innovation (1)
- Sicherheit (1)
- Signal processing (1)
- Simulation (1)
- Single-sex educational programmes (1)
- Situation-awareness (1)
- Smart Things (1)
- Smart homes (1)
- Smart meters (1)
- Smart system (1)
- Social network services (1)
- Software engineering (1)
- State controller (1)
- Strain-gauge sensor (1)
- Stream Processing (1)
- Super- vised learning (1)
- Supervised classification (1)
- Surveillance (1)
- Sustainability (1)
- Switches (1)
- System risk assessment (1)
- Task analysis (1)
- Technical debt (1)
- Textile electrodes (1)
- Time (1)
- Training (1)
- Transformation (1)
- Tunable light source (1)
- UML (1)
- UPW polishing (1)
- Ultra pure water (1)
- Ultrathin (1)
- Unnecessary alarms (1)
- User eXperience (1)
- VUV-photoreactor (1)
- Virtual environment (1)
- Virtual environments (1)
- Virtual reality (1)
- Visualization (1)
- Voltage control (1)
- Waveform (1)
- Web servers (1)
- Web services (1)
- Women in STEM (1)
- Wound healing (1)
- pedagogy (1)
- software engineering (1)
- sustainability design (1)
- sustainability education (1)
Digital Transformation, Smart Factories, and Virtual Design: Contributions of Subject Orientation
(2018)
It is a fundamental right of every natural person to control which personal information is collected, stored and processed by whom, for what purposes and how long. In fact, many (cloud based) services can only be used if the user allows them broad data collection and analysis. Often, users can only decide to either give their data or not to participate in communities. The refusal to provide personal data results in significant drawbacks for social interaction. That is why we believe that there is a need for tools to control one's own data in an easy and effective way as protection against economic interest of global companies and their cloud computing systems (as data collector from apps, mobiles and services). Especially, as nowadays everybody is permanently online using different services and devices, users are often lacking the means to effectively control the access to their private data. Therefore, we present an approach to manage and distribute privacy settings: PRIVACY-AVARE is intended to enable users to centrally determine their data protection preferences and to apply them on different devices. Thus, users gain control over their data when using cloud based services. In this paper, we present the main idea of PRIVACY-AVARE.
Applications for the Internet of Things are becoming increasingly popular. Due to the large amount of available context data, such applications can be used effectively in many domains. By interlinking these data and analyzing them, it is possible to gather a lot of knowledge about a user. Therefore, these applications pose a threat to privacy. In this paper, we illustrate this threat by looking at a real-world application scenario. Current state of the art focuses on privacy mechanisms either for Smart Things or for big data processing systems. However, our studies show that for a comprehensive privacy protection a holistic view on these applications is required. Therefore, we describe how to combine two promising privacy approaches from both categories, namely AVARE and PATRON. Evaluation results confirm the thereby achieved synergy effects.