Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A GDPR Compliant Approach to Assign Risk Levels to Privacy Policies

    Abdullah R. Alshamsan1, Shafique A. Chaudhry1,2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4631-4647, 2023, DOI:10.32604/cmc.2023.034039

    Abstract Data privacy laws require service providers to inform their customers on how user data is gathered, used, protected, and shared. The General Data Protection Regulation (GDPR) is a legal framework that provides guidelines for collecting and processing personal information from individuals. Service providers use privacy policies to outline the ways an organization captures, retains, analyzes, and shares customers’ data with other parties. These policies are complex and written using legal jargon; therefore, users rarely read them before accepting them. There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels. Most of the… More >

  • Open Access

    ARTICLE

    Personalized Privacy Protecting Model in Mobile Social Network

    Pingshui Wang1,*, Zecheng Wang1, Tao Chen1,2, Qinjuan Ma1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 533-546, 2019, DOI:10.32604/cmc.2019.05570

    Abstract With the rapid development of the new generation of information technology, the analysis of mobile social network big data is getting deeper and deeper. At the same time, the risk of privacy disclosure in social network is also very obvious. In this paper, we summarize the main access control model in mobile social network, analyze their contribution and point out their disadvantages. On this basis, a practical privacy policy is defined through authorization model supporting personalized privacy preferences. Experiments have been conducted on synthetic data sets. The result shows that the proposed privacy protecting model could improve the security of… More >

Displaying 1-10 on page 1 of 2. Per Page