501 Hits in 29.9 sec

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
2020 Electronics  
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices.  ...  The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people's daily lives.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9101693 fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa

Modeling privacy control in context-aware systems

Xiaodong Jiang, J.A. Landay
2002 IEEE pervasive computing  
) idea, 4 we aim to use information spaces to construct a model for privacy control that supports our socially based privacy objectives. 3 We also discuss how we can introduce decentralization, a desirable  ...  In this article, we describe a theoretical model for privacy control in contextaware systems based on a core abstraction of information spaces.  ...  Some activity inference programs provide high-level activity information using vision-based analysis of raw audiovisual records.  ... 
doi:10.1109/mprv.2002.1037723 fatcat:hnbtqhgptzezppsst52cl6p7um

Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions

Vimitha R Vidhya Lakshmi, Gireesh Kumar T
2017 Journal of Communications  
Following sections are comprised of details on architecture and architectural components of Mobile social networks, privacy and security issues, challenges and some existing solutions.  ...  At the end, some proposed privacy and security solutions and future directions are discussed and suggested on Mobile social networking.  ...  The entanglement of contextual information with the mobile device makes MSN special and different from traditional web based social networks.  ... 
doi:10.12720/jcm.12.9.524-531. fatcat:suttgxkaxfcmlo5zgisqhszh6m

Some Recipes Can Do More Than Spoil Your Appetite

Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das, Limin Jia
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
Our analysis finds that around 50% of the 19,323 unique recipes we examined are potentially unsafe, as they contain a secrecy violation, an integrity violation, or both.  ...  To gain an in-depth understanding of the potential security and privacy risks, we build an information-flow model to analyze how often IFTTT recipes involve potential integrity or secrecy violations.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies or endorsement, either expressed or implied, of DARPA,  ... 
doi:10.1145/3038912.3052709 dblp:conf/www/SurbatovichABDJ17 fatcat:4sd7fno2c5azvnvc2bh7c6a2we

Zero Trust Architecture (ZTA): A Comprehensive Survey

Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss
2022 IEEE Access  
Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures.  ...  The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options available for successful realization of this paradigm.  ...  The awareness score is calculated based on a neural network and game theory-based big data analysis.  ... 
doi:10.1109/access.2022.3174679 fatcat:w7c27guoqzfdffhjnpgerlnnse

How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems

Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, Isabel Wagner
2018 EAI Endorsed Transactions on Cloud Systems  
We will apply location-aware access control policies to role-based access control of Cloud Foundry, and then analyze the impact on user privacy after implementing these policies.  ...  In this study, we will develop an innovative prototype for location-aware access control and data privacy for CC systems.  ...  Privacy Analysis of Location-Aware Access Control This section will examine the privacy issues that arise from implementing location-aware access control security policy.  ... 
doi:10.4108/eai.13-7-2018.165236 fatcat:axcbjdileva3fksg4gipb6wlda

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  Security models to specify and verify security requirements related to security attributes -namely, availability, integrity, confidentiality, and access leakage -are presented.  ...  For example, lattice based military access control models.  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64

2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18

2022 IEEE Transactions on Dependable and Secure Computing  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  ., +, DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles. Gulati, A., +, TDSC Nov.  ...  -Oct. 2021 2285-2300 DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles. Gulati, A., +, TDSC Nov.  ... 
doi:10.1109/tdsc.2021.3129143 fatcat:iajg5t5wqrg2ricxbbllpgxaga

Student privacy self-management

Paul Prinsloo, Sharon Slade
2015 Proceedings of the Fifth International Conference on Learning Analytics And Knowledge - LAK '15  
Optimizing the harvesting and analysis of student data promises to clear the fog surrounding the key drivers of student success and retention, and provide potential for improved student success.  ...  As such, it can be easy to allow our enthusiasm for the possibilities offered by learning analytics to outweigh consideration of issues of privacy.  ...  The contextual integrity of privacy and data One of the major concerns in the discourses in surveillance and privacy studies is the issue of contextual integrity of privacy and personal data (see, for  ... 
doi:10.1145/2723576.2723585 dblp:conf/lak/PrinslooS15 fatcat:npfzrena75glfizowdtwiwrgdm

Social Network Norms and Intellectual Property: A Proposal for the Public Use Bar

Ari Ezra Waldman
2015 Social Science Research Network  
This proposal respects social network differences and will advance the goals of patent law and increase access to the innovation economy for all persons.  ...  through the lens of social science -namely, principles of trust.  ...  For more discussion of the social context of disclosure, see, for example, Nissenbaum, supra note 28, at 120 (arguing that "contextual integrity is the appropriate benchmark of privacy"); Waldman, supra  ... 
doi:10.2139/ssrn.2634573 fatcat:3ejpfl7c4rhwviaywos3ls4nwy

Big Data Analytics for Large-scale Wireless Networks

Hong-Ning Dai, Raymond Chi-Wing Wong, Hao Wang, Zibin Zheng, Athanasios V. Vasilakos
2019 ACM Computing Surveys  
In this paper, we present a survey of the state-of-art big data analytics (BDA) approaches for large scale wireless networks.  ...  The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large scale wireless networks.  ...  The connections of social networks can be either unidirectional or bidirectional. (iv) Contextual data.  ... 
doi:10.1145/3337065 fatcat:vjjoymozrzb6pkchdp36dh6lze


Daniel Le Métayer, Pablo Rauzy
2018 Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy - CODASPY '18  
We illustrate our framework with social network systems and show that it makes it possible to characterize the types of control over personal data that they provide to their users and to compare them in  ...  While the control of individuals over their personal data is increasingly seen as an essential component of their privacy, the word "control" is usually used in a very vague way, both by lawyers and by  ...  Particular attention has been paid to privacy policy languages in the specific context of social networks.  ... 
doi:10.1145/3176258.3176314 dblp:conf/codaspy/MetayerR18 fatcat:7g3tpu6xmncp5fmthdjp3yliqu

6G White paper: Research challenges for Trust, Security and Privacy [article]

Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala (+15 others)
2020 arXiv   pre-print
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks.  ...  The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G.  ...  Acknowledgement This draft white paper has been written by an international expert group, led by the Finnish 6G Flagship program ( at the University of Oulu, within a series of twelve  ... 
arXiv:2004.11665v2 fatcat:bejl2qm4rfh2fbbvgyhfl32kua

If This Context Then That Concern: Exploring users' concerns with IFTTT applets [article]

Mahsa Saeidi, McKenzie Calvert, Audrey W. Au, Anita Sarma, Rakesh B. Bobba
2020 arXiv   pre-print
Qualitative analysis reveals that participants had a nuanced understanding of contextual factors and how these factors could lead to leakage of sensitive data and allow unauthorized access to applets and  ...  We do so by exploring users' concerns with using IFTTT applets and more importantly if and how those concerns change based on different contextual factors.  ...  and privacy risks associated with the applet, similar to the nudges proposed by [28] for sharing online information in social network services.  ... 
arXiv:2012.12518v1 fatcat:xcrtrp6s7feo5e5n4dorpc6vxa

Sensors for Context-Aware Smart Healthcare: A Security Perspective

Edgar Batista, M. Angels Moncusi, Pablo López-Aguilar, Antoni Martínez-Ballesté, Agusti Solanas
2021 Sensors  
The advances in the miniaturisation of electronic devices and the deployment of cheaper and faster data networks have propelled environments augmented with contextual and real-time information, such as  ...  of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information  ...  Intrusion detection systems Communications HIS Network Transport Application Integrity Availability Authentication Privacy Traceability of digital evidence HIS Application Integrity Data protection Privacy  ... 
doi:10.3390/s21206886 pmid:34696099 pmcid:PMC8537585 fatcat:n7qzpwyzo5f4rppmtkknkznpz4
« Previous Showing results 1 — 15 out of 501 results