62 research outputs found
Preventing Additive Attacks to Relational Database Watermarking
False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this paper, we focus on additive attacks. We extend a conventional image-based relational data watermarking scheme by creating a non-colluded backup of the data owner marks, the so-called secondary marks positions. The technique we propose is able to identify the data owner beyond any doubt
Annotation-Based Static Analysis for Personal Data Protection
This paper elaborates the use of static source code analysis in the context
of data protection. The topic is important for software engineering in order
for software developers to improve the protection of personal data during
software development. To this end, the paper proposes a design of annotating
classes and functions that process personal data. The design serves two primary
purposes: on one hand, it provides means for software developers to document
their intent; on the other hand, it furnishes tools for automatic detection of
potential violations. This dual rationale facilitates compliance with the
General Data Protection Regulation (GDPR) and other emerging data protection
and privacy regulations. In addition to a brief review of the state-of-the-art
of static analysis in the data protection context and the design of the
proposed analysis method, a concrete tool is presented to demonstrate a
practical implementation for the Java programming language
E-Democracy and Network Externalities – The Case of Websites of Finnish Members of Parliament
- …