Filters








50,514 Hits in 3.1 sec

On Secure Consensus Information Fusion over Sensor Networks

Mahdi Kefayati, Mohammad S. Talebi, Hamid R. Rabiee, Babak H. Khalaj
2007 2007 IEEE/ACS International Conference on Computer Systems and Applications  
As an example, two secure consensus averaging methods are formulated according to BIFF.  ...  In quest for a method to make information fusion possible while preserving the mutual confidentiality and anonymity of the fused information even in case of collusion of the malicious nodes, we propose  ...  We divide distributed information fusion into two main categories: consensus information fusion or consensus fusion in short and, non-consensus information fusion.  ... 
doi:10.1109/aiccsa.2007.370871 dblp:conf/aiccsa/KefayatiTRK07 fatcat:nhcihsea5bagjn4tmfkz6hxsfq

Secure and Privacy-Preserving Consensus [article]

Minghao Ruan, Huan Gao, Yongqiang Wang
2018 arXiv   pre-print
Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control.  ...  In this paper, we propose a novel approach that enables secure and privacy-preserving average consensus in a decentralized architecture in the absence of an aggregator or third-party.  ...  Abstract-Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control.  ... 
arXiv:1707.04491v4 fatcat:75eavzsodvfmppa36n3yattmzm

Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity

Di Wang, Yan Zhu, Yi Zhang, Guowei Liu
2020 IEEE Access  
is supported by the Foundation items: National Key Technologies R&D Programs of China (2018YFB1402702); National Natural Science Foundation of China (61972032); Beijing Municipal Bureau of Economy and Information  ...  As shown in Figure 4 , we collected the average computing power of entire network from 2009 to present (May 2020) and draw a distribution trend graph.  ...  Subsequently, the confidentiality, integrity and availability (CIA) of information security have been proposed for the first time in the Information Technology Security Evaluation Criteria/ European White  ... 
doi:10.1109/access.2020.3036004 fatcat:vlppirpzzjau5lgewvw43alkza

Secure and Privacy-Preserving Average Consensus [article]

Minghao Ruan, Muaz Ahmad, Yongqiang Wang
2017 arXiv   pre-print
Average consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control.  ...  In order to reach an agreement, existing average consensus algorithms require each agent to exchange explicit state information with its neighbors.  ...  This work was supported in part by the National Science Foundation under Grant 1738902.  ... 
arXiv:1703.09364v2 fatcat:4ycn3vhhjrbfhd5w566bjjczmm

Consensus with Preserved Privacy against Neighbor Collusion [article]

Silun Zhang, Thomas Ohlson Timoudas, Munther Dahleh
2020 arXiv   pre-print
This paper proposes a privacy-preserving algorithm to solve the average consensus problem based on Shamir's secret sharing scheme, in which a network of agents reach an agreement on their states without  ...  Another virtue of this work is that such a method can protect the network consensus procedure from eavesdropping.  ...  As the information can be reconstructed entirely from a certain specified number of shares, the information injected into the network for each agent is still intact but in a confidential way.  ... 
arXiv:2011.09646v1 fatcat:pepvk6imsjbxlauhhlby4klgz4

Benefit-risk of Patients' Online Access to their Medical Records: Consensus Exercise of an International Expert Group

Siaw-Teng Liaw, Emmanouela Konstantara, Freda Mold, Richard Schreiber, Craig Kuziemsky, Amanda Terry, Simon de Lusignan, Harshana Liyanage
2018 IMIA Yearbook of Medical Informatics  
Objective: To conduct a consensus exercise to assess the impact of patients' online access to their CMRs on the quality of care as defined in six domains by the Institute of Medicine (IoM), now the National  ...  Patients' access to their computerised medical records (CMRs) is a legal right in many countries.  ...  [Enabler] Equivocation (Weighted average: 6.75) Statement 2 -Confidential information may be improperly accessed by persons related to the patient.  ... 
doi:10.1055/s-0038-1641202 pmid:29681044 fatcat:oizd6djwf5f3tlhvo5rmmxqazq

Page 471 of Journal of Management Education Vol. 38, Issue 3 [page]

2014 Journal of Management Education  
A strength of a group consensus rating pro- cess such as this is that by sharing multiple points of view, a wider array of performance information is generated.  ...  Our own observations and informal student feedback are consistent with this.  ... 

Blockchain Technology Based Information Classification Management Service

Gi-Wan Hong, Jeong-Wook Kim, Hangbae Chang
2021 Computers Materials & Continua  
It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain.  ...  Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected.  ...  In addition, in the data of the distributed ledger, only the meta-information and the security level of the asset are recorded as shown in Fig. 5 , so that sensitive contents of assets to be kept confidential  ... 
doi:10.32604/cmc.2021.013344 fatcat:wo7jh2wbczauxlz33onfk4552y

Secure consensus averaging in sensor networks using random offsets

Mahdi Kefayati, Mohammad S. Talebi, Babak H. Khalaj, Hamid R. Rabiee
2007 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications  
In this work, we have examined the distributed consensus averaging problem from a novel point of view considering the need for privacy and anonymity.  ...  We have proposed a method for incorporating security into the scalable average consensus mechanisms proposed in the literature.  ...  Falaki for our discussion on the need for distributed security and members of Sharif Digital Media Lab. (DML) for their invaluable cooperation.  ... 
doi:10.1109/ictmicc.2007.4448699 fatcat:zryrubunjzfchp4chcewxn3lbi

Medical geneticists confront ethical dilemmas: cross-cultural comparisons among 18 nations

D C Wertz, J C Fletcher, J J Mulvihill
1990 American Journal of Human Genetics  
, (4) protection of mother's confidentiality in cases of false paternity, and (5) nondirective counseling about 45,X and XYY syndrome.  ...  Screening questions showed that 72% believed that workplace screening should be voluntary and that results should be confidential.  ...  Respondents had a median of 14 years practice in genetics and spent an average of 45 h/wk in genetics; 65% were male, and 82% were married, with a median of 1.5 children.  ... 
pmid:2339711 pmcid:PMC1683845 fatcat:tenqb6ji7rhrlljs6tbg66appm

Network Consensus with Privacy: A Secret Sharing Method [article]

Silun Zhang, Thomas Ohlson Timoudas, Munther Dahleh
2021 arXiv   pre-print
Moreover, it is shown that the proposed method can achieve consensus and average consensus almost surely, when the agents have arbitrary privacy degrees and a common privacy degree, respectively.  ...  In this work, inspired by secret sharing schemes, we introduce a privacy-preserving approach for network consensus, by which all nodes in a network can reach an agreement on their states without exposing  ...  In turn, due to the reconstructability of the true state, the overall information injected into the network is still sufficient to reach network consensus but in a confidential way.  ... 
arXiv:2103.03432v1 fatcat:ec6yopl55vdajoc3k2toangvua

Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function

Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman, Rafiqul Islam
2022 Future Internet  
This work aims to preserve the privacy of user access policy by protecting the confidentiality and authenticity of the transmitted message while obtaining the necessary consents for data access.  ...  Blockchain technology has been widely advocated for security and privacy in IoT systems.  ...  The consensus in the Ethereum network is based on modified GHOST protocol.  ... 
doi:10.3390/fi14030077 fatcat:chenyyu2fzar5ach34qa3htzsm

What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things [article]

Lorenzo Ghiro
2021 arXiv   pre-print
This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT.  ...  This is in stark contrast to the requirements of most IoT applications that are made up of resource constrained devices, whose data need to be kept confidential and users to be clearly known.  ...  by reason of a strong distributed consensus protocol.  ... 
arXiv:2102.03750v1 fatcat:dbsy76wid5dopdlt4ciut7cpdq

Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases

Ibrahim Abunadi, R. Lakshmana Kumar
2021 Security and Communication Networks  
causes a lack of confidentiality.  ...  BBPM can be utilized like a digital database that includes information concurrently utilized and distributed inside a wide, decentralized, and openly accessible network.  ...  Blockchain ensures the safety of the gathered information and assists in maintaining its confidentiality.  ... 
doi:10.1155/2021/2245808 doaj:050ea1db1a294524b644e8625fbfbd57 fatcat:52snehdukrcwzfdqdg6obiq4dq

ATMChain: Blockchain-Based Security Framework for Cyber-Physics System in Air Traffic Management

Xin Lu, Zhijun Wu, Yuling Chen
2022 Security and Communication Networks  
integration of blockchain and CPS in ATM.  ...  This paper proposes a security framework based on blockchain for CPS in the ATM system.  ...  In order to accomplish the target of more "distributed," the more consensus nodes, the stronger the robustness of the system.  ... 
doi:10.1155/2022/8542876 fatcat:5gvtoeddmbdktjcpaknzpecy3u
« Previous Showing results 1 — 15 out of 50,514 results