2015_16
Guía docente 
Escuela Técnica Superior de Ingeniería
A A 
castellano 
Ingeniería Informática: Seguridad Informática y Sistemas Inteligentes (2013
 Asignaturas
  PROTECCIÓN DE LA PRIVACIDAD
   Contenidos
tema Subtema
Introduction Definitions of privacy
Meanings of privacy
Privacy, a human right
Users, sources of information and collectors of information
Privacy and Big companies
Information that you provide
Who is paying for these services?
What is the price of your data?
Governments, cyber-terrorism, e-crime, etc..
Are the citizens a goal or a collateral victim?
Users: clearly and probably stupid behaviours
Conclusions
Security and privacy in vehicular communications 1-Introduction
2-Security & Privacy in VANETS
3-Attacks in VANETS
4-Countermeasures for securing VANETs
5-Protocol: Trustworthy privacy preserving car-generated announcements in vehicular ad-hoc networks
6-Discussion on existing countermeasures
7-Combining a priori and a posteriori countermeasures
8-Message-linkable group signatures
9-Conclusions
Introduction to Database Privacy and Private Information Release 1-A Three-Dimensional Conceptual Framework for Database Privacy
1.1-Introduction
1.2-Respondent vs owner privacy
1.3-Respondent vs user privacy
1.4-Owner vs user privacy
1.5-Technology assessment
1.6-Conclusions
2-User Privacy in Web Search
2.1-Introduction
2.2-Standalone PIR relaxations
2.3-GooPIR: h(k)-PIR TrackMeNot
2.4-P2P PIR relaxations: P2P UPIR
2.5-Rational behavior in P2P UPIR
2.6-Conclusions
Privacy models in databases and data releases 1-ntroduction
2-Differentially privacy of data releases through k-anonymous
microaggregation
3-From differential privacy to (expected) t-closeness
4-Differential privacy through t -closeness
5-Conclusions
Statistical Disclosure Control 1-Introduction
2-Tabular data protection
3-Queryable database protection
4-Microdata protection
4.1-Perturbative masking methods
4.2-Non-perturbative masking methods
4.3-Synthetic microdata generation
5-Evaluation of SDC methods
5.1-Utility and disclosure risk for tabular data
5.2-Utility and disclosure risk for queryable databases
5.3-Utility and disclosure risk in microdata SDC
5.4-Trading off utility loss and disclosure risk
6-Anonymization software
7-Conclusions
Digital identity and privacy 1-Introduction
2-Digital fingerprint
3-Users profiles
4-Privacy policies
5-Privacy protecting technologies
5.1-Preserving the User’s Privacy in Web Search Engines
5.2-Preserving the User’s Privacy in Social Networking Sites
5.3-Detecting sensitive information from textual documents
6-Conclusions