Filters








2,767 Hits in 10.4 sec

Towards Privacy Protection in Smart Grid

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra
2012 Wireless personal communications  
To protect such sensitive information it is imperative that privacy protection mechanisms be used to protect the privacy of smart grid users.  ...  AMI are solid state programmable devices that can perform many functions allowing users to perform intended tasks by inputting a sequence of instructions into its processing unit and memory.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their suggestions and feedback which helped us to improve the quality and presentation of this paper.  ... 
doi:10.1007/s11277-012-0939-1 fatcat:zmzarxpk6zhtnajle2mg36jsqu

Network Security and Privacy Challenges in Smart Vehicle-to-Grid

Neetesh Saxena, Santiago Grijalva, Victor Chukwuka, Athanasios V. Vasilakos
2017 IEEE wireless communications  
When utilities and third parties use information that is provided or entrusted to them, the information should be used according to the agreed purposes that protect the privacy of the consumers.  ...  An option for vehicle verification could be the use of a trusted third party that provides resource access to the authentic users.  ...  The proposed architecture and the scheme provide clear guidelines for transmitting confidential information with integrity to intermediate devices or operators while anonymously providing authentication  ... 
doi:10.1109/mwc.2016.1600039wc fatcat:qavsge37n5b2rbeomsbhkyatr4

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds [chapter]

Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti
2016 Lecture Notes in Computer Science  
, user privacy protection and data minimisation, and authentication of stored and processed data.  ...  However, to make it secure and privacy-preserving for end users, additional technical safeguards must be added-the application of strong cryptography is such a safeguard.  ...  -Functional signatures schemes: Allow to certify computations and processes; allow to delegate signature generation to other parties for a class of messages meeting certain conditions.  ... 
doi:10.1007/978-3-319-44760-5_8 fatcat:w6uzti3defbqvmhdk2urftebxi

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  Acknowledgements The authors would like to thank Dr. Stephen Kent of BBN, who developed the RPKI concept, and whose guidance was critical to the accomplishment of this project.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

Patrícia R. Sousa, Luís Magalhães, João S. Resende, Rolando Martins, Luís Antunes
2021 Sensors  
We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.  ...  Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems.  ...  FIWARE is a platform (or framework) that contains several open-source components that can be used together or individually and has third-party components to implement intelligent designs.  ... 
doi:10.3390/s21175898 pmid:34502789 fatcat:3g6rft43ljdnzdbj52iha2iez4

Identity Assurance in the UK: technical implementation and legal implications under eIDAS

Niko Tsakalakisz, Sophie Stalla-Bourdillon, Kieron O'Hara
2017 Journal of Web Science  
control, and is the first eID system in which the government delegates the provision of identity to competing private third parties.  ...  The paper offers a discussion of Gov.UK Verify's compliance with eIDAS as well as Gov.UK Verify's potential legal equivalence to EU systems under eIDAS as a third-country legal framework after Brexit.  ...  National eID systems that are to be used across borders have to follow a notification process.  ... 
doi:10.1561/106.00000010 dblp:journals/jws/TsakalakisSO17 fatcat:v6ytzr4cobgdrgpyubmcksz3cy

Legal Education in the Blockchain Revolution

Mark Fenwick, Wulf A. Kaal, Erik P. M. Vermeulen
2017 Social Science Research Network  
For further information and recommendations, please see: https://ec.europa.eu/jrc/en/open-education/legal-notice How to cite this report: Abstract This report introduces the fundamental principles of the  ...  The European Commission shall not be held liable for any consequence stemming from the reuse.  ...  Acknowledgements This study benefited from the input and collaboration of stakeholders and experts throughout Europe and elsewhere, to whom the project team would like to express its gratitude.  ... 
doi:10.2139/ssrn.2939127 fatcat:7jvxzzixazf77hpevogzuuwtn4

D6.2 - 2Nd Open Call Text And Submission Template

Sergios Soursos, Maria Bianco, Duro Refiz, Mario Drobics, Christoph Ruggenthaler, Mikolaj Dobski, Joao Garcia, Joaquin Iranzo Yuste, Matteo Di Fraia, Jose Antonio Sanchez Murillo, Ivana Podnar Zarko
2018 Zenodo  
This deliverable provides the details of symbIoTe's 2nd Open Call.  ...  The Selected Third Party undertakes to allow European Commission staff and outside personnel authorized by the European Commission the appropriate right of access to the sites and premises of the Selected  ...  The Selected Third Party agrees that the European Commission may have an audit of the use made of the Financial Support carried out either directly by the European Commission staff or by any other outside  ... 
doi:10.5281/zenodo.1135596 fatcat:v5mnvhgamjfqde4evcekmtsbyu

Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview [chapter]

Hu Xiong, Zhi Guan, Jianbin Hu, Zhong Che
2012 Applied Cryptography and Network Security  
) , allow a semi-trusted proxy to transform a delegateeąŕs signature into a delegatorąŕs signature on the same message by using some additional information.  ...  formation of the group, and does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a ring arbitrarily without being controlled by any other party.  ...  Accept the signature if and only if are computed by the following equations: d ′ 1 = a c 0 T s 1 −c2 γ 1 1 /(a s 2 −c2 λ 1 y s 3 ) mod n, d ′ 2 = T s 1 −c2 γ 1  ... 
doi:10.5772/34675 fatcat:kdh5dl4wd5dyjofe5avynsku7e

Link spamming Wikipedia for profit

Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
A principal goal of spammers is to maximize exposure, the quantity of people who view a link.  ...  The status quo spamming model relies on link persistence to accumulate exposures, a strategy that fails given the diligence of the Wikipedia community.  ...  The authors recognize the helpful advice of Sampath Kannan (UPenn, professor), Robert Terrell (UPenn, Office of General Counsel), and Bo Adler (UCSC, Ph.D. student).  ... 
doi:10.1145/2030376.2030394 dblp:conf/ceas/WestCVSL11 fatcat:gb3z74ahpjaa3lwuhlwohfcb2a

PROTECTION OF DRAWINGS AND PATTERNS BY ADMINISTRATIVE LAW MEANS IN INTELLECTUAL PROPERTY LAW

Ovidia Janina IONESCU
2014 Challenges of the Knowledge Society  
According to the relevant Romanian legislation, i.e.  ...  Law no. 129/1992 on the protection of drawings and patterns and Government Decision no. 211/2008 for the approval of the Regulation enforcing Law no. 129/1992, rights over drawings or patterns may also  ...  Romania; drawing or pattern uses a hallmark that provides the holder of that mark with the right to prohibit such use.  ... 
doaj:7df0e1e97fe3460cb7fdc015c83dbb44 fatcat:74qc7cnmfzfflakm46jofvinb4

Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission

Abdullah Ayub Khan, Asif Ali Laghari, Aftab Ahmed Shaikh, Sami Bourouis, Amir Madany Mamlouk, Hammam Alshazly
2021 Applied Sciences  
It also provides robustness in terms of security and privacy of records and maintains integrity with secure preservation as compared to that of the other state-of-the-art methods.  ...  Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities.  ...  • In this regard, a unique hash-encrypted ID generates in every content verification of the education certificate that allows stakeholders to trace records.  ... 
doi:10.3390/app112210917 fatcat:jkleoi6lqzbf5a3ig5znrxrgte

Contents Page

2013 Epidemiologic Reviews  
The DIML is based on the third edition of ECMAScript [1] .  ...  The concept of Digital Item Methods is that, on receipt of a Digital Item, a User will have available a "list" of processes ("methods") that can be applied to the Digital Item.  ...  as appropriate against members' requirements in terms of data and process, noting local synonyms (or translations), to create an "E-SMEF".  Using E-SMEF, to apply emerging SMPTE metadata standards to  ... 
doi:10.1093/epirev/mxs015 fatcat:tkblkwc5rvgorayu3f5cv5dxaa

Data Protection and the Prevention of Cybercrime - The EU as an Area of Security?

Maria Grazia Porcedda
2012 Social Science Research Network  
I then claim that the implementation of data protection principles in a cyber-security policy can act as a proxy to reduce cyber threats, and in particular (narrow) cybercrime, provided that the following  ...  On the other, it explores the possibility of reconciling data protection and privacy with the prevention of cybercrime and the pursuit of a cyber-security policy (and therefore it explores causation).  ...  28 on confidentiality and limitation on use allows the requested party to: (a) impose to grant its assistance only if confidentiality is kept; (b) explicitly invoke that the content of the assistance  ... 
doi:10.2139/ssrn.2169340 fatcat:delhfmf3vrh6nb25mcgvyqmney

MANAGEMENT OF SECURITY OF THE BUSINESS INFORMATION AS EXEMPLIFIED BY THE NATIONAL DEBT REGISTER OF THE BUSINESS INFORMATION BUREAU JSC
ZARZĄDZANIE BEZPIECZEŃSTWEM INFORMACJI GOSPODARCZYCH NA PRZYKŁADZIE KRAJOWEGO REJESTRU DŁUGÓW BIURA INFORMACJI GOSPODARCZEJ SA

Katarzyna Jasińska, Martin Kaczmarski
2018 Management Sciences  
The article first discusses the specific nature of business information as a special type of information regulated by the Act dedicated to it.  ...  The aim of the article is to characterize the specificity of business information and issues related to ensuring their security on the example of the Business Information Bureau.  ...  document, indication of a person or body stating that the document has been falsified, or the fact that it belongs to a third party. systems necessary for their existence and functioning; and information  ... 
doi:10.15611/ms.2018.1.04 fatcat:bt7nqlxpbvejvks5vc24xuzvny
« Previous Showing results 1 — 15 out of 2,767 results