A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions
[chapter]
2007
IFIP International Federation for Information Processing
In this paper, we introduce a third party payment system that aims to preserve privacy by severing the link between their purchase and payment records, while providing a traceable transaction that maintains ...
One solution to this problem was SET, but it was never really a success because of its complexity and poor reception from consumers. ...
Thus, the status quo presents great privacy and security risk to the consumer. In this paper, we re-examine the use of a third party payment service. ...
doi:10.1007/978-0-387-72367-9_24
fatcat:kqbagy3y55bbbjwrzk3yh5o2su
Identity business processes
2014
International Journal of Trust Management in Computing and Communications
Business processes in SOA are a composition of services provided by IT systems and manual actions performed by humans. Such compositions highly depend on the identity of participants. ...
processes. ...
leading to these results has received funding from the Seventh Framework Programme of the European Union (FP7/2007-2013) under grant agreement n o 216287 (TAS 3 -Trusted Architecture for Securely Shared Services ...
doi:10.1504/ijtmcc.2014.063274
fatcat:gz5fcs2lcncx3gb44hsufdbmf4
Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities
[chapter]
2012
Lecture Notes in Computer Science
In our prototype, we only sign the key and send the key plus the DAA signature to the host instead of a X.509 certificate and the according chain. ...
The signing party which signs the DAA parameters could also be the vendor, however, at the cost of an extra service and additional processing steps on the platform required for validating the parameters ...
doi:10.1007/978-3-642-32287-7_30
fatcat:5jrij2mqvrcgjokjgvhz62spfe
Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity
2021
Information & Management
Know your customer (KYC) processes place a great burden on banks, because they are costly, inefficient, and inconvenient for customers. ...
We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain's role for SSI. ...
Thereby, only the statuses of completed KYC processes are stored on a blockchain. ...
doi:10.1016/j.im.2021.103553
fatcat:6d7gzvptubfxfdtcsig64pvyey
Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0
[article]
2020
arXiv
pre-print
It realizes data confidentiality of P2P communication and data processing in smart contracts of blockchains. ...
We show that previous blockchain based privacy protection approaches offer protection, but give the control of the data to (potentially not trustworthy) third parties, which also can be considered a privacy ...
To establish consensus of the certification status, each entity participates in a voting process via smart contracts. ...
arXiv:2007.14195v1
fatcat:6dqt7bagmrfonf5aviqsbdxhpu
Sybil Attack Detection Based on Authentication Process Using Digital Security Certificate Procedure for Data Transmission in MANET
2018
International Journal of Engineering & Technology
To detect the sybil node during the route discovery process, the nodes authenticate each other by providing the digital security certificate (DSC). ...
The proposed system ensures the availability, confidentiality, authenticity and reliability of the information using digital certificate chains and secret sharing schemes. ...
The Privacy-Preserving Detection of Sybil Attacks Attackers have more computational power and canalter their transmission signal strength. ...
doi:10.14419/ijet.v7i3.27.17891
fatcat:wootz62ydff65pkb5v63wqb45u
Non-Repudiation in Internet Telephony
[chapter]
2007
IFIP International Federation for Information Processing
The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. ...
This has the advantage to store and transport certificates and certificate chains in combination with the data. ...
On the other hand, a compromised Arc does not posses the certificate. ...
doi:10.1007/978-0-387-72367-9_31
fatcat:p5inue4xjjggtha5xuxwdozehe
A survey: applications of blockchain in the Internet of Vehicles
2021
EURASIP Journal on Wireless Communications and Networking
Additionally, some existing surveys on the blockchain enabled IoVs are reviewed. ...
Currently, the technique has obtained great research interest on other areas, including the Internet of vehicles (IoVs). ...
On-chain data should notice two aspects namely storage and sharing of data, and off-chain data should be highlighted the query-processing and analysis of data. ...
doi:10.1186/s13638-021-01958-8
fatcat:65o7v72rnnhcblxchmf2il7cxu
Towards a secure and trustworthy imaging with non-fungible tokens
2021
Applications of Digital Image Processing XLIV
This paper identifies the main challenges in NFTs and discusses potential directions in order to remedy to their current shortcomings, with emphasis on digital assets in form of images. ...
Could NFT sellers circumvent this issue by deploying privacy-preserving smart contracts rather than standard smart contracts? ...
store them either off-chain or on-chain, breaking full interoperability between different implementations of NFTs. ...
doi:10.1117/12.2598436
fatcat:5fcjafxe75atpip2agmytjsfwe
A Process for Generating Concrete Architectures
[chapter]
2013
Enabling Things to Talk
From a functional point of view one option can be a one-way hash chain to provide effective and efficient authentication. ...
one-to-one transactions wherein a service is accessed by a remote player. ...
The optimal selection of design choices is dependent on the actual use case and therefore a one-fits-all complete solution cannot be given in this section. ...
doi:10.1007/978-3-642-40403-0_6
fatcat:w536njoqqfebtflrtobi6hxsie
Invited Talk - Towards Semantics-Aware Access Control
[chapter]
2004
IFIP International Federation for Information Processing
Thanks are also due to Stefano Paraboschi for his valuable contributions on P2P reputation management. ...
Acknowledgments The authors wish to thank Pierangela Samarati for joint work on semanticsaware access control. ...
In access control, identity-related data and metadata about subjects enjoy a special status due to privacy concerns. ...
doi:10.1007/1-4020-8128-6_12
fatcat:c4cycdr73zb5nhesskkmijzrvu
Privacy-preserving revocation checking
2008
International Journal of Information Security
This paper focuses on the privacy in revocation checking, explores the loss of privacy in current revocation checking techniques and proposes simple and efficient privacy-preserving techniques for two ...
certificate in question. ...
If we employ range queries to enable privacy-preserving querying, then the communication cost depends on the number of revoked certificates in the range. ...
doi:10.1007/s10207-008-0064-z
fatcat:g7zllyqxxzbkveatgoc4tpmhhu
NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates
2021
Software, Practice & Experience
This article explores a promising solution for secure Digital Health Certificate, called NovidChain, a Blockchain-based privacy-preserving platform for COVID-19 test/vaccine certificates issuing and verifying ...
level of protection of personal data, in compliant with the GDPR and KYC requirements, and guarantees the user's self-sovereignty, while ensuring both the safety of populations and the user's right to privacy ...
Privacy preservation: NovidChain relies on an off-chain InterPlanetary File System-IPFS storage 19 to store encrypted user's personal data including COVID-19 results. ...
doi:10.1002/spe.2983
fatcat:3giruxf57nfvxj7clzcrxeck74
Medical Data Processing and Analysis for Remote Health and Activities Monitoring
[chapter]
2019
Msphere
In this chapter, we discuss (1) data collection, fusion, ownership and privacy issues; (2) models, technologies and solutions for ...
Health monitoring systems involve processing and analysis of data retrieved from smartphones, smart watches, smart bracelets, as well as various sensors and wearable devices. ...
Data can be stored on multiple locations, under multiple vendors, processed by many services. ...
doi:10.1007/978-3-030-16272-6_7
fatcat:z2xiyrr7brgflhpuqhtkwagm3i
Hierarchical key management for multi-resolution load data representation
2014
2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)
Emphasis is placed on a privacy-aware design that gives the end-user the freedom to decide which entity is allowed to access user related data and at what granularity. ...
This information can be used in ways that violate consumer privacy. ...
Privacy Preserving Architecture There are different possibilities to enforce privacy protection. One is by regulation and law. ...
doi:10.1109/smartgridcomm.2014.7007767
dblp:conf/smartgridcomm/PeerEW14
fatcat:a333ydgu4jen5cdhq4mwyesg2y
« Previous
Showing results 1 — 15 out of 8,415 results