109,045 Hits in 10.9 sec

LORE: An infrastructure to support location-aware services

Y. Chen, X. Y. Chen, F. Y. Rao, X. L. Yu, Y. Li, D. Liu
2004 IBM Journal of Research and Development  
The moving object database manages the location stream and processes the location-based queries. The spatial publish/subscribe engine enables intelligent location-aware message notification.  ...  With the advance in wireless Internet and mobile computing, location-based services (LBS)-the capability to deliver location-aware content to subscribers on the basis of the positioning capability of the  ...  ., or Object Management Group, Inc. in the United States, other countries, or both.  ... 
doi:10.1147/rd.485.0601 fatcat:3xuahju5wfco5ohage5d35scdu

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things [chapter]

Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké
2020 Lecture Notes in Computer Science  
In addition, it will address mobility, customization of security and privacy services, and support for generic IoT applications, particularly for smart city.  ...  A security and privacy plane allowing better implementation of context-aware security and privacy mechanisms is also proposed.  ...  Depending on the type of detected conflict, it applies a set of policies to provide a context with a better-quality. For example, user's location sensing policy can be based on the up-to-dateness.  ... 
doi:10.1007/978-3-030-41702-4_15 fatcat:3ybeyqttnfeihlinyo62kmvffy

Issues, Challenges, and Research Opportunities in Intelligent Transport System for Security and Privacy

Qazi Ali, Naveed Ahmad, Abdul Malik, Gauhar Ali, Waheed Rehman
2018 Applied Sciences  
These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution.  ...  This article leverages new researchers for challenges and opportunities related to security and privacy in ITS.  ...  Similarly, a survey presented in [30] is an excellent survey on pseudonym changing mechanisms to protect location privacy but lacks analysis of each technique in every privacy category of ITS with respect  ... 
doi:10.3390/app8101964 fatcat:qflphwfkr5gqjkqy33chxoblhe

A Summary of Security Techniques-Based Blockchain in IoV

Chen Chen, Shi Quan, Haowen Tan
2022 Security and Communication Networks  
With the rapid development of the informatization and industrialization of the Internet of Vehicles (IoV), the number and application of connected vehicles are growing rapidly.  ...  , privacy, trust management, access control, and so on, to support the distributed system architecture and solve the security challenges of the Internet of Vehicles.  ...  [28] proposed a twofactor authentication and key management mechanism for secure data transmission in virtual networks, which provided a high level of security for the vehicle side of virtual networks  ... 
doi:10.1155/2022/8689651 fatcat:7aerxlc7v5dgtbfjdp47v72ip4

Identity management in GRID computing and Service Oriented Architectures: research and practice

Theodora Varvarigou, Vassiliki Andronikou
2009 Identity in the Information Society  
Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high  ...  Within this context, security and privacy requirements have become of great importance, as well the need for flexible and efficient identity management.  ...  Although initially designed and developed for facilitating high performance computing applications, such as simulations, this new computing approach aims also at supporting highly collaborative applications  ... 
doi:10.1007/s12394-010-0040-4 fatcat:j7xuusvm2bc2hanf4rkeayyanm

Overview of 5G security technology

Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi
2018 Science China Information Sciences  
Security requirements of new business applications 5G needs to use protection mechanisms in accordance with different security requirements for the three application scenarios, eMBB, mMTC, and uRLLC [18  ...  different security mechanisms and solutions); and adaptive arrangements and management.  ...  which provided a solution for application of the wireless key security mechanism in FDD based NB-IoT.  ... 
doi:10.1007/s11432-017-9426-4 fatcat:qva7tdx2xfc7lj3d5fslym6dsi

Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey

Muhammad Sameer Sheikh, Jun Liang, Wensong Wang
2020 Wireless Communications and Mobile Computing  
In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys  ...  Vehicles are equipped with the heavy communication equipment which requires a high power supply, on-board computing device, and data storage devices.  ...  Chen and Wei [100] presented a trust scheme based on beacon mechanism to improve the location privacy in VANETs.  ... 
doi:10.1155/2020/5129620 fatcat:6akm5x43pnegdkcu4xe4tewe5u

Ubiquitous Data-Centric Sensor Networks

Ting Yang, Peng-Yung Woo, Zhaoxia Wang, Javid Taheri, Chin Hoong Choor, Guoqiang Hu
2014 International Journal of Distributed Sensor Networks  
We take this opportunity to thank them for their great support and cooperation.  ...  Acknowledgments Achieving such a high quality of papers would have been impossible without the huge work that was undertaken by the editorial board members and external reviewers.  ...  The paper "Scalability dynamic multicast labels management mechanism for ubiquitous data-centric sensor networks" studied the effective data query and location technique with privacy protection, which  ... 
doi:10.1155/2014/459768 fatcat:dwqtffztobb65gkmsho2jkzkei

Security and Privacy Dimensions in Next Generation DDDAS/Infosymbiotic Systems: A Position Paper

Li Xiong, Vaidy Sunderam
2015 Procedia Computer Science  
We propose a security and privacy preserving framework for next generation systems that harness the full power of the DDDAS paradigm while (1) ensuring provable privacy guarantees for sensitive data; (  ...  While every single smartphone or wearable device is potentially a sensor with powerful computing and data capabilities, privacy and security in the context of human participants must be addressed to leverage  ...  To compensate for unreliable inputs however, we need to develop trust-based mechanisms that combine historical information with modeling to improve confidence.  ... 
doi:10.1016/j.procs.2015.05.357 fatcat:yvddllnnfbbclaun4wevqtbmzm

Privacy-Enhanced Android for Smart Cities Applications [chapter]

Matthew Lepinski, David Levin, Daniel McCarthy, Ronald Watro, Michael Lack, Daniel Hallenbeck, David Slater
2016 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The current paper describes a plan for developing Privacy-Enhanced Android, an extension of the current Android OS with new privacy features based on homomorphic and functional encryption and Secure Multiparty  ...  Many Smart Cities applications will collect data from and otherwise interact with the mobile devices of individual users.  ...  [13] , while providing privacy-preserving mechanisms for user responses.  ... 
doi:10.1007/978-3-319-33681-7_6 fatcat:nomrehem2reybpzojj244wpft4

Privacy-Aware Autonomous Agents for Pervasive Healthcare

Monica Tentori, Jesus Favela, Marcela Rodriguez
2006 IEEE Intelligent Systems  
Pervasive technology in hospital work raises important privacy concerns. Autonomous agents can help developers design privacy-aware systems that handle the threats raised by pervasive technology.  ...  Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, vol. 2, no. 1, 2003, pp. 56-64.For more information on this or any other computing topic, please  ...  Hence, agent-based pervasive applications require triggering the privacy-aware mechanisms during communication of the information.  ... 
doi:10.1109/mis.2006.118 fatcat:rl2tkxqbbfffxpll2o57ievobu

A Practical and Extendible VANETs Privacy-Preserving System

Tao Yang, Jian-Bin Hu, Zhong Chen
2013 Journal of Automation and Control Engineering  
The proposed system is based on the key technologies such as TP4RS protocol, and achieves some good features: the system not only can provide good identity and location privacy protecting for the vehicles  ...  In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting.  ...  Because of the capriciousness of the applications, it must have high expandability to adapt to the new-adding applications and the patch for the old applications.  ... 
doi:10.12720/joace.1.2.166-169 fatcat:pasgdrbohzfobbiorkchaavgay

Applications of Small and Medium Enterprise Management System Using Edge Algorithm

Limei Huang, Fazlullah Khan
2021 Mobile Information Systems  
information based on the protection mechanism of edge computing.  ...  The application layer realizes the storage and integration of enterprise information data through the regulation of the collaborative management center and realizes the privacy encryption protection of  ...  When users use location-based services or perform location-related operations, they submit the real location to the edge node and then implement the location privacy protection mechanism at the edge node  ... 
doi:10.1155/2021/8730413 fatcat:lzcb2hzf4fax7al2fqs6e2cksu

Scalable Location Management for Context-Aware Systems [chapter]

Jadwiga Indulska, Ted McFadden, Matthias Kind, Karen Henricksen
2003 Lecture Notes in Computer Science  
The proposed location management system provides conflict resolution of location information and mechanisms to ensure privacy.  ...  This paper presents a location management system able to gather, process and manage location information from a variety of physical and virtual location sensors.  ...  Section 4 shows the application of P3P for defining privacy rules for location information access and illustrates an extension to provide a user friendly mechanism for defining privacy policies.  ... 
doi:10.1007/978-3-540-40010-3_20 fatcat:ue22okcnizcotpxmf5x7b3bjrq

Blockchain Application on the Internet of Vehicles (IoV) [article]

Nyothiri Aung, Tahar Kechadi, Sahraoui Dhelim, Tao Zhu, Aymen Dia Eddine Berini, Tahar Guerbouz
2022 arXiv   pre-print
However, the key characteristics of IoV, such as high-speed mobility and frequent disconnections make it difficult to manage its security and privacy.  ...  With the rapid development of the Internet of Things (IoT) and its potential integration with the traditional Vehicular Ad-Hoc Networks (VANETs), we have witnessed the emergence of the Internet of Vehicles  ...  In the proposed scheme, the vehicles establish trust connections to engage with location-based services (LBS).  ... 
arXiv:2205.03832v1 fatcat:73ocv5hdtzba7ifwozovnqwu2q
« Previous Showing results 1 — 15 out of 109,045 results