Filters








482 Hits in 3.2 sec

A Secure e-Health Architecture based on the Appliance of Pseudonymization

Bernhard Riedl, Veronika Grascher, Thomas Neubauer
2008 Journal of Software  
This paper introduces the new architecture PIPE (Pseudonymization of Information for Privacy in e-Health) that integrates primary and secondary usage of health data.  ...  These concerns and the lack of existing approaches that provide a sufficient level of security raise the need for a system that guarantees data privacy and keeps the access to health data under strict  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.4304/jsw.3.2.23-32 fatcat:oecnz3y3dbdlxa2t46q5rpkqiy

A data pseudonymization protocol for Smart Grids

Cristina Rottondi, Giulia Mauri, Giacomo Verticale
2012 2012 IEEE Online Conference on Green Communications (GreenCom)  
This paper proposes a pseudonymization protocol for data gathered by the meters: the protocol relies on a network infrastructure that involves a set of Privacy Preserving Nodes (PPNs).  ...  The paper also provides an evaluation of the security and of the performance of the protocol.  ...  [10] present a new architecture for the pseudonymization of medical data, based on a layered structure with authorization mechanisms.  ... 
doi:10.1109/greencom.2012.6519618 dblp:conf/onlinegreencomm/RottondiMV12 fatcat:iyw4doloazfydeh5nsf2oi4ubi

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
This paper presents a detailed description of the new system PIPE (Pseudonymization of Information for Privacy in e-Health) which differs from existing approaches in its ability to securely integrate primary  ...  the prevention of health data misuse.  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

Mobile Location-Based Services for Trusted Information in Disaster Management [chapter]

Lemonia Ragia, Michel Deriaz, Jean-Marc Seigneur
2009 Information Systems Development  
The data are in a central database and every user can input data via virtual tags. The system is based on spatial messages which can be sent from any user to any other in a certain distance.  ...  The goal of the present paper is to provide location based services for disaster management. The application involves services related to the safety of the people due to an unexpected event.  ...  A secured spatial massaging system must therefore respect, in addition to the "traditional" security services, the following "specific" ones: • A user has only one pseudonym at a time. • A user must be  ... 
doi:10.1007/b137171_78 dblp:conf/isdevel/RagiaDS08 fatcat:shc5oizvyrd45cp55ytqiwande

Mobile edge computing for internet of things (IoT): security and privacy issues

Atiqur Rahman
2020 Indonesian Journal of Electrical Engineering and Computer Science  
We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure.  ...  In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.  ...  ACKNOWLEDGEMENT This work is supported partly by the project of Science and Technology Research Program of Chongqing Education Commission of China under Grants KJQN201800642, the Doctoral student training  ... 
doi:10.11591/ijeecs.v18.i3.pp1486-1493 fatcat:yz5rkfbsong6ro7wodoptg7rgm

D1.1 - ASCLEPIOS Technical, Security, Healthcare and Data Privacy Requirements

Norwegian Centre For E-Health Research, RISE Research Institutes Of Sweden AB, SECURA BV
2019 Zenodo  
Documentation of the technical and security requirements that will guide the development and will define the capabilities of the IT components of ASCLEPIOS.  ...  The priority of the requirements will be made available in deliverable D1.2 ASCLEPIOS Reference Architecture, Security and E-health Use Cases, and Acceptance Criteria, based on the detailed analysis of  ...  H-DST3 A cloud-based e-health framework SHALL secure encryption/decryption keys. H-DST4 A cloud-based e-health framework SHALL ensure minimal storage overhead.  ... 
doi:10.5281/zenodo.4022256 fatcat:d43ttwlr3vhldo7y5nrf373gs4

Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions

David Eckhoff, Isabel Wagner
2018 IEEE Communications Surveys and Tutorials  
Based on our taxonomies, we describe existing privacy-enhancing technologies, review the state of the art in real cities around the world, and discuss promising future research directions.  ...  Smart cities rely on a large number of application areas and technologies to realize complex interactions between citizens, third parties, and city departments.  ...  ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their insightful and in-depth comments which have helped to greatly improve the paper.  ... 
doi:10.1109/comst.2017.2748998 fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy

Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid [chapter]

Suleyman Uludag, Sherali Zeadally, Mohamad Badra
2015 Computer Communications and Networks  
Along these lines, this chapter introduces some of the privacy issues and problems in the domain of the SG, develops a unique taxonomy of some of the recently proposed privacy protecting solutions as well  ...  What makes the SG privacy even more challenging and intriguing is the fact that the very success of the initiative depends on the expanded data generation, sharing, and processing.  ...  electrical appliances) through the use of a Pseudonymous Identity (PID).  ... 
doi:10.1007/978-3-319-08470-1_15 fatcat:eidtx25w2nc6rpl2b6uvcrblqi

Privacy preservation for V2G networks in smart grid: A survey

Wenlin Han, Yang Xiao
2016 Computer Communications  
Privacy is now a big obstacle in the way of the development of V2G networks.  ...  The privacy preservation problem in V2G networks could be more severe than in other parts of Smart Grid due to its e-mobility.  ...  Acknowledgement This work was supported in part by the National Nat-  ... 
doi:10.1016/j.comcom.2016.06.006 fatcat:dsyptr4dyvdahadwhh2htll6zi

User Privacy Framework for Web-of-Objects based Smart Home Services

Muhammad Ansar Latif, Farman Ullah, Hynwoo Lee, Won Ryu, Sungchang Lee
2015 International Journal of Smart Home  
This paper presents user privacy framework for web-of-objects based smart home services to control the release of personally identifiable information (PII) in smart home environment.  ...  We propose Smart Home Web of Object User Privacy (SWOPR) architecture to protect and control the release of user PIIs according to the user consent.  ...  The Techno House in Japan provided an E-health care home system for elderly and disabled persons [10] , the Georgia Research Alliance project of The Aware Home [11] addressed the challenges facing in  ... 
doi:10.14257/ijsh.2015.9.5.07 fatcat:fwciappzizh63flbohpnumoboi

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation

Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying
2021 IEEE Network  
To explore possible solutions to address the challenges, we first investigate the state-of-the-art architecture designs for DM and emphasize advantages of a blockchain-based DM architecture.  ...  In addition, we review recent privacy regulations with their impacts on DM and discuss the existing solutions with privacy regulation compliance based on blockchain.  ...  A straightforward way is to use a fresh one-time pseudonym per uploading to overcome the drawback at the huge cost of data storage and communication at the user side, since users need to update their pseudonyms  ... 
doi:10.1109/mnet.011.2000666 fatcat:ri3f3ptzh5bw3l6aqfsqtabkxi

A Paper on Internet of Things

Anadi Shukla
2019 International Journal for Research in Applied Science and Engineering Technology  
One of the most frequent word used in the Information Technology nowadays Is Internet of Things .It is now often said that the future is internet of things will change the real entities to smart objects  ...  The paper aims to provide an overview of IOT usages in our daily life. This also provides a passage for further researches.  ...  E. Architecture A large number of objects are expected to connect with IOT making it impossible for old architecture to carry.  ... 
doi:10.22214/ijraset.2019.3226 fatcat:zdeh4snszjfwrerk2uala3igna

Tutorial: Identity Management Systems and Secured Access Control

Anat Hovav, Ron Berger
2009 Communications of the Association for Information Systems  
With the advent of interorganizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and  ...  With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical  ...  This architecture was based on a static port allocation. The CU identified terminals based on their physical location and address.  ... 
doi:10.17705/1cais.02542 fatcat:lrl5bsk4xjhvlkpsirnvtrz2gq

Towards Privacy Protection in Smart Grid

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra
2012 Wireless personal communications  
According to the conceptual model of the National Institute of Standards and Technology (NIST), a smart grid is a complex infrastructure based on a set of seven chief domains [4]: bulk generation, energy  ...  intelligent devices or appliance devices in the home.  ...  Sherali Zeadally was partially supported by a District of Columbia NASA Space Grant and an NSF TIP grant (Award Number 1036293) during the course of this work.  ... 
doi:10.1007/s11277-012-0939-1 fatcat:zmzarxpk6zhtnajle2mg36jsqu

Efficient public-key certificate revocation schemes for smart grid

Mohamed M. E. A. Mahmoud, Jelena Misic, Xuemin Shen
2013 2013 IEEE Global Communications Conference (GLOBECOM)  
For the secure use of the public key cryptography, an efficient and secure certificate revocation scheme specially tailored to smart grid architecture should be adopted.  ...  The public key cryptography will play an essential role in securing the smart grid communications.  ...  Usability: Geographic area CAx's signature on the content of the CRL TPD U → CA: ID U , E K (REV_CONF, Ts, Cert_IDs), Sig U (E K (REV_CONF, Ts, Cert_IDs)) CA → TPD U : ID CA , E K (REVOKE, Ts, Cert_IDs  ... 
doi:10.1109/glocom.2013.6831167 dblp:conf/globecom/MahmoudMS13 fatcat:izfw5mpmoreqdknnav77cpd6zm
« Previous Showing results 1 — 15 out of 482 results