Tânia Basso

  • Citations Per Year
Learn More
Software faults are known as a major cause of computational systems' defects. Even when these systems are tested exhaustively they can present some failures due to the activation of residual software faults in the source code. Software fault injection tools are useful to emulate the presence of software faults and to monitor the system allowing one to(More)
This paper provides an overview of the tools and methodologies for data privacy protection that can cope with the challenges raised by the Big Data storage and analytics processing, with focus on anonymity. Preserving individual privacy is one of the major issues in the context of Big Data, as while handling huge volumes of data, it is possible that(More)
Most software systems developed nowadays are highly complex and subject to strict time constraints, and are often deployed with critical software faults. In many cases, software faults are responsible for security vulnerabilities which are exploited by hackers. Automatic web vulnerability scanners can help to locate these vulnerabilities. Trustworthiness of(More)
Organizational Information Systems (IS) collect, store, and manage personal and business information through web applications and services. Due to regulation laws and to protect the privacy of users, clients, and business partners, such information must be kept private. This paper proposes a privacy reference architecture that can serve as foundation for(More)
Data privacy is a key challenge that is exacerbated by Big Data storage and analytics processing requirements. Big Data and Cloud Computing are related and allow the users to access data from any device, making data privacy essential as the data sets are exposed through the web. Organizations care about data privacy as it directly affects the confidence(More)
Organizational Information Systems (IS) collect, store, and manage personal and business data. Due to regulation laws and to protect the privacy of users, clients, and business partners, these data must be kept private. This paper proposes a model and a mechanism that allows defining access control policies based on the user profile, the time period, the(More)
The considerable increase in the use of cloud computing and big data solutions requires the use of advanced technologies to ensure data security, privacy and dependability. One of the possible solutions is the use of data anonymization techniques, which performs an important role in data privacy protection. There are several techniques and algorithms to(More)
Personal information is continuously gathered and processed by modern web applications. Due to regulation laws and to protect the privacy of users, customers, and business partners, such information must be kept private. A recurring problem in constructing web applications and services that protect privacy is the insufficient resources for documenting them.(More)
  • 1