A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Secure Consensus Information Fusion over Sensor Networks
2007
2007 IEEE/ACS International Conference on Computer Systems and Applications
As an example, two secure consensus averaging methods are formulated according to BIFF. ...
In quest for a method to make information fusion possible while preserving the mutual confidentiality and anonymity of the fused information even in case of collusion of the malicious nodes, we propose ...
We divide distributed information fusion into two main categories: consensus information fusion or consensus fusion in short and, non-consensus information fusion. ...
doi:10.1109/aiccsa.2007.370871
dblp:conf/aiccsa/KefayatiTRK07
fatcat:nhcihsea5bagjn4tmfkz6hxsfq
Secure and Privacy-Preserving Consensus
[article]
2018
arXiv
pre-print
Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control. ...
In this paper, we propose a novel approach that enables secure and privacy-preserving average consensus in a decentralized architecture in the absence of an aggregator or third-party. ...
Abstract-Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control. ...
arXiv:1707.04491v4
fatcat:75eavzsodvfmppa36n3yattmzm
Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity
2020
IEEE Access
is supported by the Foundation items: National Key Technologies R&D Programs of China (2018YFB1402702); National Natural Science Foundation of China (61972032); Beijing Municipal Bureau of Economy and Information ...
As shown in Figure 4 , we collected the average computing power of entire network from 2009 to present (May 2020) and draw a distribution trend graph. ...
Subsequently, the confidentiality, integrity and availability (CIA) of information security have been proposed for the first time in the Information Technology Security Evaluation Criteria/ European White ...
doi:10.1109/access.2020.3036004
fatcat:vlppirpzzjau5lgewvw43alkza
Secure and Privacy-Preserving Average Consensus
[article]
2017
arXiv
pre-print
Average consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control. ...
In order to reach an agreement, existing average consensus algorithms require each agent to exchange explicit state information with its neighbors. ...
This work was supported in part by the National Science Foundation under Grant 1738902. ...
arXiv:1703.09364v2
fatcat:4ycn3vhhjrbfhd5w566bjjczmm
Consensus with Preserved Privacy against Neighbor Collusion
[article]
2020
arXiv
pre-print
This paper proposes a privacy-preserving algorithm to solve the average consensus problem based on Shamir's secret sharing scheme, in which a network of agents reach an agreement on their states without ...
Another virtue of this work is that such a method can protect the network consensus procedure from eavesdropping. ...
As the information can be reconstructed entirely from a certain specified number of shares, the information injected into the network for each agent is still intact but in a confidential way. ...
arXiv:2011.09646v1
fatcat:pepvk6imsjbxlauhhlby4klgz4
Benefit-risk of Patients' Online Access to their Medical Records: Consensus Exercise of an International Expert Group
2018
IMIA Yearbook of Medical Informatics
Objective: To conduct a consensus exercise to assess the impact of patients' online access to their CMRs on the quality of care as defined in six domains by the Institute of Medicine (IoM), now the National ...
Patients' access to their computerised medical records (CMRs) is a legal right in many countries. ...
[Enabler] Equivocation (Weighted average: 6.75)
Statement 2 -Confidential information may be improperly accessed by persons related
to the patient. ...
doi:10.1055/s-0038-1641202
pmid:29681044
fatcat:oizd6djwf5f3tlhvo5rmmxqazq
Page 471 of Journal of Management Education Vol. 38, Issue 3
[page]
2014
Journal of Management Education
A strength of a group consensus rating pro- cess such as this is that by sharing multiple points of view, a wider array of performance information is generated. ...
Our own observations and informal student feedback are consistent with this. ...
Blockchain Technology Based Information Classification Management Service
2021
Computers Materials & Continua
It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain. ...
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. ...
In addition, in the data of the distributed ledger, only the meta-information and the security level of the asset are recorded as shown in Fig. 5 , so that sensitive contents of assets to be kept confidential ...
doi:10.32604/cmc.2021.013344
fatcat:wo7jh2wbczauxlz33onfk4552y
Secure consensus averaging in sensor networks using random offsets
2007
2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications
In this work, we have examined the distributed consensus averaging problem from a novel point of view considering the need for privacy and anonymity. ...
We have proposed a method for incorporating security into the scalable average consensus mechanisms proposed in the literature. ...
Falaki for our discussion on the need for distributed security and members of Sharif Digital Media Lab. (DML) for their invaluable cooperation. ...
doi:10.1109/ictmicc.2007.4448699
fatcat:zryrubunjzfchp4chcewxn3lbi
Medical geneticists confront ethical dilemmas: cross-cultural comparisons among 18 nations
1990
American Journal of Human Genetics
, (4) protection of mother's confidentiality in cases of false paternity, and (5) nondirective counseling about 45,X and XYY syndrome. ...
Screening questions showed that 72% believed that workplace screening should be voluntary and that results should be confidential. ...
Respondents had a median of 14 years practice in genetics and spent an average of 45 h/wk in genetics; 65% were male, and 82% were married, with a median of 1.5 children. ...
pmid:2339711
pmcid:PMC1683845
fatcat:tenqb6ji7rhrlljs6tbg66appm
Network Consensus with Privacy: A Secret Sharing Method
[article]
2021
arXiv
pre-print
Moreover, it is shown that the proposed method can achieve consensus and average consensus almost surely, when the agents have arbitrary privacy degrees and a common privacy degree, respectively. ...
In this work, inspired by secret sharing schemes, we introduce a privacy-preserving approach for network consensus, by which all nodes in a network can reach an agreement on their states without exposing ...
In turn, due to the reconstructability of the true state, the overall information injected into the network is still sufficient to reach network consensus but in a confidential way. ...
arXiv:2103.03432v1
fatcat:ec6yopl55vdajoc3k2toangvua
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
2022
Future Internet
This work aims to preserve the privacy of user access policy by protecting the confidentiality and authenticity of the transmitted message while obtaining the necessary consents for data access. ...
Blockchain technology has been widely advocated for security and privacy in IoT systems. ...
The consensus in the Ethereum network is based on modified GHOST protocol. ...
doi:10.3390/fi14030077
fatcat:chenyyu2fzar5ach34qa3htzsm
What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things
[article]
2021
arXiv
pre-print
This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT. ...
This is in stark contrast to the requirements of most IoT applications that are made up of resource constrained devices, whose data need to be kept confidential and users to be clearly known. ...
by reason of a strong distributed consensus protocol. ...
arXiv:2102.03750v1
fatcat:dbsy76wid5dopdlt4ciut7cpdq
Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases
2021
Security and Communication Networks
causes a lack of confidentiality. ...
BBPM can be utilized like a digital database that includes information concurrently utilized and distributed inside a wide, decentralized, and openly accessible network. ...
Blockchain ensures the safety of the gathered information and assists in maintaining its confidentiality. ...
doi:10.1155/2021/2245808
doaj:050ea1db1a294524b644e8625fbfbd57
fatcat:52snehdukrcwzfdqdg6obiq4dq
ATMChain: Blockchain-Based Security Framework for Cyber-Physics System in Air Traffic Management
2022
Security and Communication Networks
integration of blockchain and CPS in ATM. ...
This paper proposes a security framework based on blockchain for CPS in the ATM system. ...
In order to accomplish the target of more "distributed," the more consensus nodes, the stronger the robustness of the system. ...
doi:10.1155/2022/8542876
fatcat:5gvtoeddmbdktjcpaknzpecy3u
« Previous
Showing results 1 — 15 out of 50,514 results