15,002 Hits in 6.3 sec

An Analysis Grid for Privacy-Related Properties of Social Network Systems

Regina Marin, Guillaume Piolle, Christophe Bidan
2013 2013 International Conference on Social Computing  
Based on the analysis grid result, this paper also presents the application of latticebased tools to classify and visualize social network systems in privacy-related hierarchies.  ...  This paper proposes a multicriteria analysis grid designed to evaluate several properties of SNSs related to privacy trade-offs.  ...  Acknowledgements: This work has been partially funded by the grant "ARED Presodis" of the Bretagne region.  ... 
doi:10.1109/socialcom.2013.79 dblp:conf/socialcom/MarinPB13 fatcat:rwmlr44p5zgcfc5lqty32durge

Attack Vectors to Metering Data in Smart Grids under Security Constraints

Florian Skopik, Zhendong Ma
2012 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops  
These results are valuable input for future architectures and designs of critical system components incorporating effective security and privacy protection mechanisms.  ...  Hence, this paper presents the most important results of an in-depth analysis of threats and attack vectors that could impede the wide adoption of automatic metering in smart grids.  ...  An identification of threats and structural analysis of vulnerabilities is an important step toward securing smart grid infrastructures and the basis for developing advanced security and privacy protection  ... 
doi:10.1109/compsacw.2012.34 dblp:conf/compsac/SkopikM12 fatcat:ggdbyr2235cktdz6k7hndu2hyu

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [article]

Bin Jiang, Jianqiang Li, Guanghui Yue, Houbing Song
2021 arXiv   pre-print
We firstly review related papers on IIoT and privacy protection, respectively.  ...  Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection.  ...  For inherent properties, Geng et al. discussed in depth and improves the differential privacy mechanism by using the related properties.  ... 
arXiv:2101.10569v2 fatcat:xwebjbcvcjhbbaehajhdfjocia

Dynamic Trust Management for Community Based Mobile Grid Application

2019 International Journal of Engineering and Advanced Technology  
Trust plays an important role for handling the security in the community based system.  ...  Mobile Grid is the inter-networking of heterogeneous physical as well as virtualdevices. Each device transfer and share the information with each other.  ...  The concept of trust not only contains the security but also reliability, goodness, strength and different other properties of an entity [8] .  ... 
doi:10.35940/ijeat.b3437.129219 fatcat:sd7jiwtqmve4ro7uujy3svedqu

Technical Committee on Networks and Communication Systems [Technical Activities]

2021 IEEE Control Systems  
In particular, analysis questions focus on controltheoretic properties of these network systems, along with collective and emergent properties of network systems such as synchronization.  ...  analysis of social systems modeling; social systems identification and scalable algorithms for inference with social data; design of incentive mechanisms for steering social behaviors toward desired outcomes  ...  systems, as well as present the latest results on various emerging topics such as social learning and opinion dynamics, network propagation models, coordination of competitive network systems, information  ... 
doi:10.1109/mcs.2021.3107759 fatcat:os6u7irhnreotgujkgbpstklmy

Tool Support of Formal Methods for Privacy by Design [article]

Sibylle Schupp
2019 arXiv   pre-print
Formal methods are, in principle, suited for supporting the recent paradigm of privacy by design, but no overview is available that summarizes which particular approaches have been investigated, for which  ...  Using the techniques of search-based literature review and snowballing this paper answers those questions for a selected set of research papers.  ...  privacy.  ... 
arXiv:1903.11092v1 fatcat:6mnlr5w5bna77bnphxe7yzzxku

Cheating in Online Games

Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, Matei Ripeanu, Adriana Iamnitchi
2014 ACM Transactions on Internet Technology  
In particular: socially aware distributed systems, characterization of social and peer-to-peer networks, usage aware resource management, data management, cloud computing.  ...  RESEARCH SUMMARY Distributed systems, with emphasis on designing, implementing and experimenting with algorithms, services and applications for large-scale networked-systems.  ...  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design.  ... 
doi:10.1145/2602570 fatcat:djn4jaec3nhunpim7sgvwpmvp4

Toward Unified Security and Privacy Protection for Smart Meter Networks

Georgios Kalogridis, Mahesh Sooriyabandara, Zhong Fan, Mustafa A. Mustafa
2014 IEEE Systems Journal  
ACKNOWLEDGMENT The authors would like to thank the Directors of the Toshiba Telecommunications Research Laboratory for their support, as well as Dr. Tim Farnham for his invaluable comments.  ...  In this context, SM privacy can be studied as an undetectability property of appliance load signatures [16] .  ...  Related work While the focus of our paper is not an exhaustive survey of various security and privacy mechanisms of SG, we briefly mention below some of the related work.  ... 
doi:10.1109/jsyst.2013.2260940 fatcat:hl7ujtbmcnat3lyyoxfhlmfcny

Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks

Hongwei Li, Chao Zhang, Mohamed Mahmoud, Rongxing Lu
2020 IEEE Transactions on Vehicular Technology  
vehicular social networks (VSNs) that promote the prosperity of VANETs and lay a solid foundation for the development of vehicular based services.  ...  In "Lightweight Blockchain Consensus Protocols for Vehicular Social Networks," the authors present lightweight blockchain consensus protocols that are specifically designed for vehicular social networks  ...  He was/is on the editorial boards of several international referred journals, e.g., IEEE NETWORK, and served/serves the Technical Symposium Co-Chair of IEEE GLOBECOM'16, IEEE ICC'21, and many technical  ... 
doi:10.1109/tvt.2020.2991623 fatcat:rqjvbm3df5dpljevvlimyqd4ju

Smart Grids and Ethics

Tally Hatzakis, Rowena Rodrigues, Wright David
2019 ORBIT Journal  
This case study explores the principal ethical issues that occur in the use of Smart Information Systems (SIS) in smart grids and offers suggestions as to how they might be addressed.  ...  The empirical case study describesone of the largest distribution system operators (DSOs) in the Netherlands .  ...  They are grateful to UCLan Cyprus for their contribution to quality assurance of the case study.  ... 
doi:10.29297/orbit.v2i2.108 fatcat:vevhc2r7bfcfrpdz6bstizlzee

Privacy regulation, Spatial culture and Communities in a communally diverse city: Ghadames, Libya

Farag A El-agouri, Vail Karakale
2018 Journal of World Architecture  
In this paper quantitative analysis is performed in order to observe the relationship between privacy as cultural specific and the spatial configuration of the settlement in the city of Ghadames.The analysis  ...  Space syntax, the analytical tool of this study, is a set of techniques for representation and quantification of spatial patterns of buildings.  ...  of an urban system.  ... 
doi:10.26689/jwa.v2i1.516 fatcat:a4mngbetbfbhpovcddbzgromju

Energy Justice and Smart Grid Systems: Evidence from the Netherlands and the United Kingdom

Christine Milchram, Rafaela Hillerbrand, Geerten van de Kaa, Neelke Doorn, Rolf Künneke
2018 Applied Energy  
For policy makers and designers of smart grids, the paper provides guidance for considering interconnected social and moral values in the design of policies and smart grid technologies.  ...  The increased use of information and communication technology raises value conflicts on privacy and cyber security, which are related to energy justice.  ...  Acknowledgements The authors thank Daniela Maxouri and Joeri Weel for support with the data collection, as well as the anonymous reviewers for their constructive and thorough feedback.  ... 
doi:10.1016/j.apenergy.2018.08.053 fatcat:xadaeufmgrbh7h7xfgltg744b4

Conflicting values in the smart electricity grid a comprehensive overview

T.E. de Wildt, E.J.L. Chappin, G. van de Kaa, P.M. Herder, I.R. van de Poel
2019 Renewable & Sustainable Energy Reviews  
The smart electricity grid is a key enabler of the energy transition. Its successful deployment is however jeopardized by social acceptance issues, such as concerns related to privacy and fairness.  ...  A B S T R A C T This paper aims to anticipate social acceptance issues related to the deployment of the smart electricity grid by identifying underlying value conflicts.  ...  In the smart electricity grid, privacy concerns center around information transfer in private and public networks.  ... 
doi:10.1016/j.rser.2019.05.005 fatcat:u44kquetgjellfmyxiv6yxcjrm

Towards Privacy Protection in Smart Grid

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra
2012 Wireless personal communications  
The privacy related issue here is that for proper functioning of AMI system, very detailed and often precise information about user"s electricity usage is needed.  ...  We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity.  ...  Sherali Zeadally was partially supported by a District of Columbia NASA Space Grant and an NSF TIP grant (Award Number 1036293) during the course of this work.  ... 
doi:10.1007/s11277-012-0939-1 fatcat:zmzarxpk6zhtnajle2mg36jsqu

Key Technologies of IoT Service Security and Privacy Protection

Dongxian Yu, Jiatao Kang, Junlei Dong
2021 Converter  
Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication  ...  Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture  ...  The criminals aim at communication networks, information systems, and user information and property.  ... 
doi:10.17762/converter.158 fatcat:6kjzuhuvi5afhitf5nxdh36s3y
« Previous Showing results 1 — 15 out of 15,002 results