Search results for "Computer security"

showing 10 items of 433 documents

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Trust-enhanced intelligent security model

2012

In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use opinions to express trustworthiness of such assignments.

Information privacybusiness.industryComputer scienceInternet privacyAccess controlComputer security modelComputer securitycomputer.software_genreContent analysisSoftware agentData_GENERALData integrityConfidentialitybusinessSubjective logiccomputer2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

Vulnerability Analysis of Interdependent Critical Infrastructures upon a Cyber-attack

2019

InterdependenceComputer scienceVulnerability assessmentmedia_common.quotation_subjectCyber-attackCascading effectsScenario analysisComputer securitycomputer.software_genrecomputerSystem dynamicsmedia_commonProceedings of the Annual Hawaii International Conference on System Sciences
researchProduct

The silent work of speech. On an Enactive Grammar’s Insight

2019

Many research programs have been worked out in recent years in order to account for an apparently trivial aspect of the human language activity. We refer to the fact that every speaker hears the sound of his own words. Our paper aims to embed this empirical insight in the theoretical framework of the so-called enactive grammar. This choice is justified by the fact that the enactive grammar introduced a formal distinction which allows to provide a clear formulation of the jakobsonian assert. In order to highlight this point, the paper will be subdivided into seven sections. The first section will be devoted to the experience of the hearing oneself speak. The second one will examine this expe…

Internal Receiver Enaction Language Activity Self-RepairPoint (typography)GrammarComputer scienceProcess (engineering)media_common.quotation_subjectPrincipal (computer security)computer.software_genreSelf-MonitoringLinguisticsOrder (business)Section (archaeology)HearerListenerSelf-monitoringEnactionOther-MonitoringcomputerInterpretermedia_common
researchProduct

Mapping Elderly Citizen’s Computer and ICT Use in a Small-sized Norwegian Municipality

2015

In Norway, many citizens’ services are exclusively or at least delivered online. They usually require sufficient knowledge to use information and communication technologies (ICT). As part of an Interreg IV European project focused on e-inclusion for elderly, this work presents a study to map computer and Internet use among the elderly. The study was carried out in a small municipality of 10 000 inhabitants in Southern Norway, of whom15% were 65-year-olds or older. 178 replies out of 500 were obtained. Results showed that 9 out of 10 had access to and frequently used a computer at home. However, there still was 1 out of 5 who did not make effective use of ICT. Importantly, half of the resp…

Internet usebusiness.industryInternet privacyNorwegianComputer securitycomputer.software_genrelanguage.human_languageWork (electrical)Information and Communications TechnologyElderly populationlanguageThe InternetbusinesscomputerProceedings of the International Conference on Health Informatics
researchProduct

Struggles for recognition: a content analysis of messages posted on the Internet

2012

Anders Johan W Andersen,1,2 Tommy Svensson31Department of Psychosocial Health, University of Agder, Norway; 2Nordic School of Public Health, Gothenburg, Sweden; 3Department of Behavioral Sciences and Learning, Linköping University, Linköping, SwedenBackground: The Internet has enlarged the possibilities of human communication and opened new ways of exploring perceptions of mental health. This study is part of a research project aiming to explore, describe, and analyze different discourses of mental health in Norway and Sweden, using material from Internet-based services.Aim: To examine messages posed by users of publicly available question-and-answer services and to descri…

Internet-based servicesInjury controlbusiness.industryAccident preventionJournal of Multidisciplinary Healthcarepublic healthMedia studiesPoison controlGeneral MedicineComputer securitycomputer.software_genresocial theoryContent analysisVDP::Social science: 200::Psychology: 260::Personality psychology: 264VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552MedicineThe Internetbusinesscomputermental healthGeneral NursingDoveOriginal ResearchJournal of Multidisciplinary Healthcare
researchProduct

Capturing citizens — Emerging needs: Using social networks in smart cities

2017

In order to reach its objectives, smart cities (or whatever kind of smart urban environment) should be underpinned by complex cyber physical systems (CPS) able to discover needs and services and "smartly" combine them. Services may be thought as services offered by software components, of whatever nature, for instance software, bot, robot, app and so on. Searching for the best service depends on the need of the citizen(s) and also on the type of (smart) environment the citizens are in. Analysis and design of CPSs are more challenging than the only physical or the only cyber system. We propose a design paradigm shift towards runtime for identifying requirements of cyber physical systems for …

IoTrequirements analysisService (systems architecture)021103 operations researchcyber physical systemComputer sciencebusiness.industry0211 other engineering and technologiesCyber-physical system020207 software engineering02 engineering and technologyComputer securitycomputer.software_genreSmart citieSoftwareComponent-based software engineering0202 electrical engineering electronic engineering information engineeringRobotSoftware systembusinesscomputerDesign paradigmRequirements analysis2017 AEIT International Annual Conference
researchProduct

Information Infrastructures and the Challenge of the Installed Base

2017

In this chapter we present the theoretical perspective of information infrastructures, which is used to analyze the empirical cases in the book. In this perspective, information technology is seen as intimately intertwined with organizational structures, procedures and work practices, and as an underlying, supporting and often invisible infrastructure. Information infrastructures are not only local, but shared among distributed actors which can have multiple and different needs and interests. Understanding the complexities and mechanisms involved in the evolution of information infrastructures is at the core of this perspective which challenges traditional management approaches. Instead of …

Knowledge managementComputer sciencebusiness.industry05 social sciencesControl (management)Perspective (graphical)Information technology050905 science studiesComputer securitycomputer.software_genreWork (electrical)0502 economics and businesseHealthOrganizational structure0509 other social sciencesInstalled baseInformation infrastructurebusinesscomputer050203 business & management
researchProduct