National Repository of Grey Literature 49 records found  beginprevious40 - 49  jump to record: Search took 0.01 seconds. 
Personality Protection and Camera Systems
Široký, Oldřich ; Cvik, Eva Daniela (advisor) ; Pavla, Pavla (referee)
The thesis deals with the protection of individual integrity and camera systems, through the lens of valid and effective law regulation. The content of this work is formulation of theoretical basis, an analysis of relevant laws governing the issue of individual integrity protection of natural persons (especially their privacy) and camera systems, specifically for each type of camera system: the camera system with recording, camera system without recording, comparison of both types of camera systems and an account of legal instruments available for protection of individual integrity of each person, whose universal individual integrity rights were violated due to the operation of a camera system (regardless of it's type). The theoretical basis is followed by the main body of work, which explores researching camera system usage within a specific public authority agency. The operation of camera system is subjected to critical legal analysis, where particular aspects of a specific public authority subject's practice is evaluated as part of the findings of the thesis and qualified as compliant or non-compliant with the law. At the end of the work, the author formulates specific recommendations to the public authority agency, aiming to improve the approach to operating a camera system from the legal point of view.
Person de-identification upon primary biometric traits
Šidó, Balázs ; Burget, Radim (referee) ; Přinosil, Jiří (advisor)
This bachelor’s thesis deals with various methods protecting privacy by de-identification based on the primary biometric traits. The first chapter describes face de-identification with ad-hoc, naive and advanced methods. It also describes the Active Appearance Models and the Active Shape Models. The second chapter consists of a general overview of voice signal processing and of voice de-identification methods by changing the levels of energy in each frequency band and by pitch shift. The following chapters are describing the realized face de-identification program and an algorithm design for reversible face de-identification using the appearance parameters of the Active Appearance Model. This is followed by algorithm designs for voice de-identification. The results of the experiments done with the de-identified pictures are introduced in the last chapter. The realized program were written in Matlab.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Privacy Preserving Cryptographic Protocols for Secure Heterogeneous Networks
Malina, Lukáš ; Dočkal, Jaroslav (referee) ; Vaněk, Tomáš (referee) ; Zeman, Václav (advisor)
Disertační práce se zabývá kryptografickými protokoly poskytující ochranu soukromí, které jsou určeny pro zabezpečení komunikačních a informačních systémů tvořících heterogenní sítě. Práce se zaměřuje především na možnosti využití nekonvenčních kryptografických prostředků, které poskytují rozšířené bezpečnostní požadavky, jako je například ochrana soukromí uživatelů komunikačního systému. V práci je stanovena výpočetní náročnost kryptografických a matematických primitiv na různých zařízeních, které se podílí na zabezpečení heterogenní sítě. Hlavní cíle práce se zaměřují na návrh pokročilých kryptografických protokolů poskytujících ochranu soukromí. V práci jsou navrženy celkově tři protokoly, které využívají skupinových podpisů založených na bilineárním párování pro zajištění ochrany soukromí uživatelů. Tyto navržené protokoly zajišťují ochranu soukromí a nepopiratelnost po celou dobu datové komunikace spolu s autentizací a integritou přenášených zpráv. Pro navýšení výkonnosti navržených protokolů je využito optimalizačních technik, např. dávkového ověřování, tak aby protokoly byly praktické i pro heterogenní sítě.
System of anonymous data collection
Troják, David ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with contemporary approaches that provide higher protection of privacy of users. It focuses mainly on a group signature. In the practical part of this thesis I designed and implemented PS that is enable to gather information with the help of signal of a mobile device. The application was designed in accordance with fundamental cryptographic requirements such as the authenticity and the integrity of transmitted data. The anonymity of users is guaranteed through an application layer (the group signature) as well as through a network layer (Tor).
Tunneling and Cryptographic protocols as a privacy protection on regulated internet
Čížek, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured using Wireshark network protocol analyzer and also the analysis of potential risks has been done for the event that the communication would be captured by a third party - the regulator.
Analysis of Privacy on Social Networks
Tomandl, Luboš ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to four recognized actors active on Facebook. Those actors are users, Facebook company, other corporations and government organizations. From all of these groups threats for user's privacy can come. This thesis not only tries to find these threats, but is wants to offer some solutions of this situation as well.
Data retention (not only) in police work: Analysis of police procedures (and another authorities) for requesting and use of call detail records of telephony and internet traffic and transaction data
Iuridicum Remedium ; Vobořil, Jan
Tato studie navazuje na studii zpracovanou v roce 2010 pod názvem „Co dělají provideři a telefonní operátoři s našimi daty? Studie praxe poskytovatelů internetových a telekomunikačních služeb (ISP)“, která se věnovala problematice nakládání s osobními údaji ze strany poskytovatelů služeb elektronických komunikací včetně jejich praxe při poskytování provozních a lokalizačních údajů. Na rozdíl od této dřívější studie, která se zaměřila hlavně na praxi u poskytovatelů služeb elektronických komunikací, se zde zaměříme na praxi při využívání provozních a lokalizačních údajů na straně oprávněných orgánů, zejména Policie ČR.
Fulltext: Download fulltextPDF
Behavioral Targeting of Advertising on Internet
Uhrová, Kateřina ; Stříteský, Václav (advisor) ; Koudelka, Jan (referee)
The goal of the diploma thesis is to analyze the situation of behavioral targeted advertising in the Czech Internet market, assess its potential in the future and evaluate the effectiveness of behavioral targeting on the Czech market. This thesis is focused first on the Internet advertising market, media planning, explanation of selected targeting approaches and on detailed description of the behaviorally targeted ads including the online privacy issue. In the practical part analysis of the behavioral targeted advertising on the Czech market through expert interviews and evaluation of the effectiveness of behavioral targeting on an example of an advertising campaign of selected company is to be found.

National Repository of Grey Literature : 49 records found   beginprevious40 - 49  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.