63,731 Hits in 8.8 sec

A Generic Information and Consent Framework for the IoT

Victor Morel, Mathieu Cunche, Daniel Le Metayer
2019 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)  
The Internet of Things (IoT) raises specific issues in terms of information and consent, which makes the implementation of the General Data Protection Regulation (GDPR) challenging in this context.  ...  In this report, we propose a generic framework for information and consent in the IoT which is protective both for data subjects and for data controllers.  ...  Acknowledgments This work has been partially funded by the CHIST-ERA project UPRISE-IoT, and by the INSA Lyon -SPIE ICS chair on the Internet of Things.  ... 
doi:10.1109/trustcom/bigdatase.2019.00056 dblp:conf/trustcom/MorelCM19 fatcat:l4e3aln5zvbelhjnjjvvqogmtq

Information systems security and privacy

Willis H. Ware
1984 Communications of the ACM  
For example, it was the source of the Digital Encryption Standard some live years ago and it made a very significant contribution to the protection of information while in transit through a communication  ...  Let me first clarify the relationship between security and privacy, where I use the latter term in the context of record-keeping privacy; namely, the use of information about people to make decisions and  ... 
doi:10.1145/358027.358034 fatcat:ahmdgfk5pvbqrnluxcp6vqtcqm

Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries

Willard Munyoka, Manoj S. Maharaj
2019 South African Journal of Information Management  
consider privacy, security, risk and trust issues of e-government systems to encourage the utilisation of such systems by citizens.  ...  , perceived trust, perceived risk and optimism bias.Objectives: The aim of this study was to investigate the effect of privacy, security, trust, optimism bias and perceived risk on citizens' use behaviour  ...  Therefore, to promote e-government acceptance and utilisation by citizens, governments in the Southern African Development Community (SADC) region should ensure the privacy of personal information, data  ... 
doi:10.4102/sajim.v21i1.983 fatcat:h4vgkgdkcng33lk4eeyfekoe5y

Privacy Versus Collective Security [chapter]

Bas van Schoonhoven, Arnold Roosendaal, Noor Huijboom
2014 IFIP Advances in Information and Communication Technology  
This bias may threaten the privacy of individuals on the long run and may obscure potential solutions that enhance both security and privacy.  ...  towards developing and using security technologies, and some other factors are biased towards hindering the development and use of privacy technologies.  ...  and security, trust and concern.  ... 
doi:10.1007/978-3-642-55137-6_7 fatcat:mhadagwjefggjbsqs3jr3fimse

Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach

Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi
2016 2016 IEEE Trustcom/BigDataSE/ISPA  
This paper presents and model a novel general framework for privacy aware collaborative information sharing for data analysis.  ...  , and includes a novel method to compute the trade-off between privacy and accuracy.  ...  D m |, and |.| returns the number of elements in a dataset. 6) DSA Properties: Data Sharing Agreements (DSA)s are formal agreements which regulate how parties share data, enabling the secure, controlled  ... 
doi:10.1109/trustcom.2016.0137 dblp:conf/trustcom/MartinelliSS16 fatcat:o7avy2nxobbl5fuxtht3rad7nu

On current trends in security and privacy of cloud computing

Serap Sahin
2013 2013 7th International Conference on Application of Information and Communication Technologies  
One of the major components of the Cloud Computing is "Security and Privacy". These concerns about security and privacy directly address the trustworthy and reliability levels of a system.  ...  The researches and studies about security and privacy on cloud computing are continuing.  ...  Information privacy is the assured, proper, and consistent collection, processing, communication, use and disposition of disposition of personal information (PI) and personally-identifiable information  ... 
doi:10.1109/icaict.2013.6722703 fatcat:dsdsavcnpbgppdyxolkttcgiiy

Evidence-Based Security and Privacy Assurance in Cloud Ecosystems [chapter]

Saul Formoso, Massimo Felici
2016 IFIP Advances in Information and Communication Technology  
Relevant examples are the CSA STAR Certification and the ISO/IEC 27017 (cloud security) and ISO/IEC 27018 (cloud privacy) standards.  Technologies: among the various security and privacy technologies,  ...  for the privacy and confidentiality of information held in the cloud.  ... 
doi:10.1007/978-3-319-41763-9_14 fatcat:kblees6nmvb55arrfncsqzwkvm

Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications [chapter]

Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt
2013 IFIP Advances in Information and Communication Technology  
use cases highlighting the security and privacy/trust context of the communication; -A prototype implementation integrating an automotive middleware, its associated communication proxy and a customized  ...  But security considerations only at the communication layer, without considering information security, may remain insufficient.  ...  server are located in a country imposing a regulation protecting the user's privacy.  ... 
doi:10.1007/978-3-642-38323-6_2 fatcat:ayqxwauitjc6nh4pxzxey7nwhm

On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps [chapter]

Konstantin Knorr, David Aspinall, Maria Wolters
2015 IFIP Advances in Information and Communication Technology  
In this paper, we examine whether mHealth apps succeed in ensuring the privacy, security, and safety of the health data entrusted to them.  ...  additional security and safety risks.  ...  Privacy threats and relevant regulation In the US, the Health Insurance Portability and Accountability Act (HIPAA) sets legal security and privacy standards for electronically transmitted health information  ... 
doi:10.1007/978-3-319-18467-8_38 fatcat:5ucfuan76rastos6ubxfn56jwi

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns [chapter]

Christos Kalloniatis, Vassilis Manousakis, Haralambos Mouratidis, Stefanos Gritzalis
2013 IFIP Advances in Information and Communication Technology  
model best fits their needs based on their security and privacy requirements.  ...  various security and privacy issues that need to be considered before an organization or company decides to move on to the Cloud.  ...  Security and privacy risks seem to have larger impact on public, hybrid and community cloud, compared to the rest of the deployment models.  ... 
doi:10.1007/978-3-642-37437-1_7 fatcat:idxspm5nj5a3phrorp5yawyzna

Ensuring the security and privacy of information in mobile health-care communication systems

Ademola O. Adesina, Kehinde K. Agbele, Ronald Februarie, Ademola P. Abidoye, Henry O. Nyongesa
2011 South African Journal of Science  
We examine various ways of ensuring the security and privacy of a patient's electronic medical information in order to ensure the integrity and confidentiality of the information.  ...  But the vital issue in this method of information sharing is security: the patient's privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised  ...  Privacy and information protection should be regulated by a general information protection statute, with or without sector specific statutes, which will be supplemented by codes of conduct for the various  ... 
doi:10.4102/sajs.v107i9/10.508 fatcat:cwjv3foewrefhguhsyuqn5q7ku

Secure and location privacy in geographical data with electronic codebook mode-advanced encryption standard

Nikhil B. Khandare, Narendra S. Chaudhari
2021 International Journal of Vehicle Information and Communication Systems  
The results show that the proposed technique provides better key generation ratio and network size, Packet Delivery Ratio (PDR), security and higher location privacy compared with the existing techniques  ...  The key purpose of this study is to offer security in addition to location privacy against the attackers.  ...  The home page of the secure and location privacy in geographical data using the asymmetric cryptography mainly includes two internal modules viz., Location Privacy Server and User Communication. a) Cloud  ... 
doi:10.1504/ijvics.2021.10035872 fatcat:7cam2kawrfgvtjsjkanjc6movi

Enhancing information lookup privacy through homomorphic encryption

N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos, G.C. Polyzos
2013 Security and Communication Networks  
We postulate that it is desirable for future information retrieval systems to provide privacy in both what information is requested and what information is received, without raising obstacles to the deployment  ...  Because in these systems, information is distributed in various locations, traditional private information retrieval (PIR) protocols exhibit significant communication overhead.  ...  Based on the tussle taxonomy outlined in [27] we focus on security, trust, and information tussles, and how these tussles are impacted by our proposed mechanism.  ... 
doi:10.1002/sec.910 fatcat:u2mtpxuovjd5jpbkmo4hl7vdqe

Perceived security and privacy of cloud computing applications used in educational ecosystem

Tihomir Orehovacki, Darko Etinger, Snjezana Babic
2017 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)  
As an outcome, they have a large number of users worldwide which makes them vulnerable to a variety of security and privacy related threats.  ...  Study findings uncovered pros and cons of examined cloud computing applications with respect to the manner they are addressing security and privacy concerns of their users. I.  ...  Topic areas in information privacy research include among others, information privacy concerns, information privacy attitudes, trust and information privacy and information privacy practices [13] .  ... 
doi:10.23919/mipro.2017.7973516 dblp:conf/mipro/OrehovackiEB17 fatcat:vyrlg33zcfennp5mnja6vnymrm

The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services [chapter]

Ina Schiering, Jan Kretschmer
2012 IFIP Advances in Information and Communication Technology  
the E-Privacy Directive.  ...  This is achieved by a combination of organisational, and technical measures accompanied by auditing and monitoring.  ...  Future work will be based on this prototype and extend the investigation to PaaS and SaaS cloud services.  ... 
doi:10.1007/978-3-642-31668-5_7 fatcat:hs5aqxpoxbavvcpz25inx44jti
« Previous Showing results 1 — 15 out of 63,731 results