Search results for "Privacy"

showing 10 items of 402 documents

QoS Mechanisms for IEEE 802.11 Wireless LANs

2004

Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…

IEEE 802.11uWi-Fi arrayComputer scienceInter-Access Point ProtocolMobile computinglaw.inventionIEEE 802.11lawWireless lanInternet ProtocolWirelessFixed wirelessIEEE 802.11sbusiness.industryWireless networkQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Multimedia ExtensionsTelecommunications networkWLAN Authentication and Privacy InfrastructureWireless site surveyThe InternetIEEE 802.11e-2005businessTelecommunicationsMobile deviceNeuRFonComputer network
researchProduct

BlockSee: Blockchain for IoT video surveillance in smart cities

2018

The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…

Immutabilityblockchain video surveillance privacyBlockchainbusiness.industryPHYSICAL MANIPULATIONSComputer scienceOrientation (computer vision)Settore ING-INF/03 - TelecomunicazioniComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringMonitoring system02 engineering and technologyComputer securitycomputer.software_genreFace (geometry)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingTimestampInternet of Thingsbusinesscomputer
researchProduct

Using stage theorizing to make anti-phishing recommendations more effective

2018

Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…

Information Systems and ManagementInterviewComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectInternet privacystage theories02 engineering and technologyvaiheteoriatuhritManagement Information SystemsOriginality020204 information systemsManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringEmpirical evidenceverkkourkintaHealth communicationmedia_commonbusiness.industry05 social sciencesPhishingStage theoryHealth psychologykohdeviestintäCategorizationbusiness050203 business & managementSoftwareInformation Systems
researchProduct

Evaluating security and privacy issues of social networks based information systems in Industry 4.0

2022

[EN] The present study aimed to analyse the main risks related to security and privacy of social networks based information systems in Industry 4.0. The methodology we used is an innovative exploratory data-driven process divided into three steps. First, we performed sentiment analysis to divide the database composed of 67, 206 tweets into feelings. Second, we applied a topic-modelling algorithm to extract topics. Third, we applied textual analysis to collect insights. A total of 10 topics related to security and privacy issues were identified as results. The paper concludes with a discussion of the challenges and main concerns related to the identified topics.

Information Systems and ManagementKnowledge managementIndustry 4.0business.industry05 social sciences02 engineering and technologyIndustry 4.0Social networksComputer Science ApplicationsPrivacy0502 economics and businessSecurityORGANIZACION DE EMPRESAS0202 electrical engineering electronic engineering information engineeringInformation systemInformation systems020201 artificial intelligence & image processingbusiness050203 business & managementEnterprise Information Systems
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective

2019

Virtualization in the context of blockchain systems represents an essential phase in the development and migration of services from public chains to enterprise logic. Most of the ongoing blockchain uses-cases are using the existing public ledgers, but for business products and services, there is a need for custom tailored solutions to ensure flexibility and security. The Ethereum Virtual Machine has opened new ways to solve problems that require a public proof by executing logic on a decentralized ecosystem. In a natural evolutive process, virtualization logic was shaped by numerous architectures and business requirements. Beside performance and scalability, enterprise virtual machines are …

Information privacyBusiness requirementsbusiness.industryComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyVirtualizationcomputer.software_genreVirtual machineScalability0202 electrical engineering electronic engineering information engineeringBusiness logic020201 artificial intelligence & image processingSoftware engineeringbusinessFormal verificationcomputer
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct