Ingeniería Informática: Seguridad Informática y Sistemas Inteligentes (2013 |
Asignaturas |
PROTECCIÓN DE LA PRIVACIDAD |
Contenidos |
DATOS IDENTIFICATIVOS | 2015_16 |
Asignatura | PROTECCIÓN DE LA PRIVACIDAD | Código | 17665206 | |||||
Titulación |
|
Ciclo | 2º | |||||
Descriptores | Cr.totales | Tipo | Curso | Periodo | ||||
4.5 | Optativa | 2Q |
Competencias | Resultados de aprendizaje | Contenidos |
Planificación | Metodologías | Atención personalizada |
Evaluación | Fuentes de información | Recomendaciones |
tema | Subtema |
Introduction | Definitions of privacy Meanings of privacy Privacy, a human right Users, sources of information and collectors of information Privacy and Big companies Information that you provide Who is paying for these services? What is the price of your data? Governments, cyber-terrorism, e-crime, etc.. Are the citizens a goal or a collateral victim? Users: clearly and probably stupid behaviours Conclusions |
Security and privacy in vehicular communications | 1-Introduction 2-Security & Privacy in VANETS 3-Attacks in VANETS 4-Countermeasures for securing VANETs 5-Protocol: Trustworthy privacy preserving car-generated announcements in vehicular ad-hoc networks 6-Discussion on existing countermeasures 7-Combining a priori and a posteriori countermeasures 8-Message-linkable group signatures 9-Conclusions |
Introduction to Database Privacy and Private Information Release | 1-A Three-Dimensional Conceptual Framework for Database Privacy 1.1-Introduction 1.2-Respondent vs owner privacy 1.3-Respondent vs user privacy 1.4-Owner vs user privacy 1.5-Technology assessment 1.6-Conclusions 2-User Privacy in Web Search 2.1-Introduction 2.2-Standalone PIR relaxations 2.3-GooPIR: h(k)-PIR TrackMeNot 2.4-P2P PIR relaxations: P2P UPIR 2.5-Rational behavior in P2P UPIR 2.6-Conclusions |
Privacy models in databases and data releases | 1-ntroduction 2-Differentially privacy of data releases through k-anonymous microaggregation 3-From differential privacy to (expected) t-closeness 4-Differential privacy through t -closeness 5-Conclusions |
Statistical Disclosure Control | 1-Introduction 2-Tabular data protection 3-Queryable database protection 4-Microdata protection 4.1-Perturbative masking methods 4.2-Non-perturbative masking methods 4.3-Synthetic microdata generation 5-Evaluation of SDC methods 5.1-Utility and disclosure risk for tabular data 5.2-Utility and disclosure risk for queryable databases 5.3-Utility and disclosure risk in microdata SDC 5.4-Trading off utility loss and disclosure risk 6-Anonymization software 7-Conclusions |
Digital identity and privacy | 1-Introduction 2-Digital fingerprint 3-Users profiles 4-Privacy policies 5-Privacy protecting technologies 5.1-Preserving the User’s Privacy in Web Search Engines 5.2-Preserving the User’s Privacy in Social Networking Sites 5.3-Detecting sensitive information from textual documents 6-Conclusions |