Filters








8,415 Hits in 3.5 sec

Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions [chapter]

Alapan Arnab, Andrew Hutchison
2007 IFIP International Federation for Information Processing  
In this paper, we introduce a third party payment system that aims to preserve privacy by severing the link between their purchase and payment records, while providing a traceable transaction that maintains  ...  One solution to this problem was SET, but it was never really a success because of its complexity and poor reception from consumers.  ...  Thus, the status quo presents great privacy and security risk to the consumer. In this paper, we re-examine the use of a third party payment service.  ... 
doi:10.1007/978-0-387-72367-9_24 fatcat:kqbagy3y55bbbjwrzk3yh5o2su

Identity business processes

Jens Müller, Klemens Böhm
2014 International Journal of Trust Management in Computing and Communications  
Business processes in SOA are a composition of services provided by IT systems and manual actions performed by humans. Such compositions highly depend on the identity of participants.  ...  processes.  ...  leading to these results has received funding from the Seventh Framework Programme of the European Union (FP7/2007-2013) under grant agreement n o 216287 (TAS 3 -Trusted Architecture for Securely Shared Services  ... 
doi:10.1504/ijtmcc.2014.063274 fatcat:gz5fcs2lcncx3gb44hsufdbmf4

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities [chapter]

Marc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter
2012 Lecture Notes in Computer Science  
In our prototype, we only sign the key and send the key plus the DAA signature to the host instead of a X.509 certificate and the according chain.  ...  The signing party which signs the DAA parameters could also be the vendor, however, at the cost of an extra service and additional processing steps on the platform required for validating the parameters  ... 
doi:10.1007/978-3-642-32287-7_30 fatcat:5jrij2mqvrcgjokjgvhz62spfe

Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity

Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach
2021 Information & Management  
Know your customer (KYC) processes place a great burden on banks, because they are costly, inefficient, and inconvenient for customers.  ...  We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain's role for SSI.  ...  Thereby, only the statuses of completed KYC processes are stored on a blockchain.  ... 
doi:10.1016/j.im.2021.103553 fatcat:6d7gzvptubfxfdtcsig64pvyey

Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0 [article]

Jan Stodt, Christoph Reich
2020 arXiv   pre-print
It realizes data confidentiality of P2P communication and data processing in smart contracts of blockchains.  ...  We show that previous blockchain based privacy protection approaches offer protection, but give the control of the data to (potentially not trustworthy) third parties, which also can be considered a privacy  ...  To establish consensus of the certification status, each entity participates in a voting process via smart contracts.  ... 
arXiv:2007.14195v1 fatcat:6dqt7bagmrfonf5aviqsbdxhpu

Sybil Attack Detection Based on Authentication Process Using Digital Security Certificate Procedure for Data Transmission in MANET

P Muthusamy, T Sheela
2018 International Journal of Engineering & Technology  
To detect the sybil node during the route discovery process, the nodes authenticate each other by providing the digital security certificate (DSC).  ...  The proposed system ensures the availability, confidentiality, authenticity and reliability of the information using digital certificate chains and secret sharing schemes.  ...  The Privacy-Preserving Detection of Sybil Attacks Attackers have more computational power and canalter their transmission signal strength.  ... 
doi:10.14419/ijet.v7i3.27.17891 fatcat:wootz62ydff65pkb5v63wqb45u

Non-Repudiation in Internet Telephony [chapter]

Nicolai Kuntze, Andreas U. Schmidt, Christian Hett
2007 IFIP International Federation for Information Processing  
The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.  ...  This has the advantage to store and transport certificates and certificate chains in combination with the data.  ...  On the other hand, a compromised Arc does not posses the certificate.  ... 
doi:10.1007/978-0-387-72367-9_31 fatcat:p5inue4xjjggtha5xuxwdozehe

A survey: applications of blockchain in the Internet of Vehicles

Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao
2021 EURASIP Journal on Wireless Communications and Networking  
Additionally, some existing surveys on the blockchain enabled IoVs are reviewed.  ...  Currently, the technique has obtained great research interest on other areas, including the Internet of vehicles (IoVs).  ...  On-chain data should notice two aspects namely storage and sharing of data, and off-chain data should be highlighted the query-processing and analysis of data.  ... 
doi:10.1186/s13638-021-01958-8 fatcat:65o7v72rnnhcblxchmf2il7cxu

Towards a secure and trustworthy imaging with non-fungible tokens

Nicolas J. Martinod, Kambiz Homayounfar, Davi Nachtigall Lazzarotto, Evgeniy Upenik, Touradj Ebrahimi, Andrew G. Tescher, Touradj Ebrahimi
2021 Applications of Digital Image Processing XLIV  
This paper identifies the main challenges in NFTs and discusses potential directions in order to remedy to their current shortcomings, with emphasis on digital assets in form of images.  ...  Could NFT sellers circumvent this issue by deploying privacy-preserving smart contracts rather than standard smart contracts?  ...  store them either off-chain or on-chain, breaking full interoperability between different implementations of NFTs.  ... 
doi:10.1117/12.2598436 fatcat:5fcjafxe75atpip2agmytjsfwe

A Process for Generating Concrete Architectures [chapter]

Mathieu Boussard, Stefan Meissner, Andreas Nettsträter, Alexis Olivereau, Alexander Salinas Segura, Matthias Thoma, Joachim W. Walewski
2013 Enabling Things to Talk  
From a functional point of view one option can be a one-way hash chain to provide effective and efficient authentication.  ...  one-to-one transactions wherein a service is accessed by a remote player.  ...  The optimal selection of design choices is dependent on the actual use case and therefore a one-fits-all complete solution cannot be given in this section.  ... 
doi:10.1007/978-3-642-40403-0_6 fatcat:w536njoqqfebtflrtobi6hxsie

Invited Talk - Towards Semantics-Aware Access Control [chapter]

Ernesto Damiani, Sabrina De Capitani di Vimercati
2004 IFIP International Federation for Information Processing  
Thanks are also due to Stefano Paraboschi for his valuable contributions on P2P reputation management.  ...  Acknowledgments The authors wish to thank Pierangela Samarati for joint work on semanticsaware access control.  ...  In access control, identity-related data and metadata about subjects enjoy a special status due to privacy concerns.  ... 
doi:10.1007/1-4020-8128-6_12 fatcat:c4cycdr73zb5nhesskkmijzrvu

Privacy-preserving revocation checking

M. Narasimha, J. Solis, G. Tsudik
2008 International Journal of Information Security  
This paper focuses on the privacy in revocation checking, explores the loss of privacy in current revocation checking techniques and proposes simple and efficient privacy-preserving techniques for two  ...  certificate in question.  ...  If we employ range queries to enable privacy-preserving querying, then the communication cost depends on the number of revoked certificates in the range.  ... 
doi:10.1007/s10207-008-0064-z fatcat:g7zllyqxxzbkveatgoc4tpmhhu

NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates

Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel
2021 Software, Practice & Experience  
This article explores a promising solution for secure Digital Health Certificate, called NovidChain, a Blockchain-based privacy-preserving platform for COVID-19 test/vaccine certificates issuing and verifying  ...  level of protection of personal data, in compliant with the GDPR and KYC requirements, and guarantees the user's self-sovereignty, while ensuring both the safety of populations and the user's right to privacy  ...  Privacy preservation: NovidChain relies on an off-chain InterPlanetary File System-IPFS storage 19 to store encrypted user's personal data including COVID-19 results.  ... 
doi:10.1002/spe.2983 fatcat:3giruxf57nfvxj7clzcrxeck74

Medical Data Processing and Analysis for Remote Health and Activities Monitoring [chapter]

Salvatore Vitabile, Michal Marks, Dragan Stojanovic, Sabri Pllana, Jose M. Molina, Mateusz Krzyszton, Andrzej Sikora, Andrzej Jarynowski, Farhoud Hosseinpour, Agnieszka Jakobik, Aleksandra Stojnev Ilic, Ana Respicio (+3 others)
2019 Msphere  
In this chapter, we discuss (1) data collection, fusion, ownership and privacy issues; (2) models, technologies and solutions for  ...  Health monitoring systems involve processing and analysis of data retrieved from smartphones, smart watches, smart bracelets, as well as various sensors and wearable devices.  ...  Data can be stored on multiple locations, under multiple vendors, processed by many services.  ... 
doi:10.1007/978-3-030-16272-6_7 fatcat:z2xiyrr7brgflhpuqhtkwagm3i

Hierarchical key management for multi-resolution load data representation

Christian D. Peer, Dominik Engel, Stephen B. Wicker
2014 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)  
Emphasis is placed on a privacy-aware design that gives the end-user the freedom to decide which entity is allowed to access user related data and at what granularity.  ...  This information can be used in ways that violate consumer privacy.  ...  Privacy Preserving Architecture There are different possibilities to enforce privacy protection. One is by regulation and law.  ... 
doi:10.1109/smartgridcomm.2014.7007767 dblp:conf/smartgridcomm/PeerEW14 fatcat:a333ydgu4jen5cdhq4mwyesg2y
« Previous Showing results 1 — 15 out of 8,415 results