Filters








75 Hits in 7.8 sec

Securing Real-Time Internet-of-Things

Chien-Ying Chen, Monowar Hasan, Sibin Mohan
2018 Sensors  
This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices.  ...  Recent developments and new functionality require real-time embedded devices to be connected to the Internet.  ...  The authors would like to acknowledge the contributions from our team members and collaborators: Man-Ki Yoon, Fardin Abdi Taghi Abad, Rodolfo Pellizzoni, Rakesh B Bobba, Lui Sha and Marco Caccamo.  ... 
doi:10.3390/s18124356 fatcat:2jgtpytntnexhnxv6zace45yh4

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  Thus, remote attestation is a technology for enabling mutual trust between cooperating entities in a distributed system. In the IoT, this could for example be an edge device and a cloud server.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
This white paper provides a) a brief introduction to the Edge computing concept, b) an exhaustive technology review focusing on virtualisation, orchestration, network control, and operational frameworks  ...  The 5G PPP Initiative and the 5GIA are happy to present a new white paper entitled "Edge Computing for 5G Networks".  ...  Integrity and remote attestation Remote attestation is a technique that has gain momentum in Telco NFV environment because it generates trust and liability for the NFVI and VNFs.  ... 
doi:10.5281/zenodo.4555780 fatcat:sg62p5agq5c75hsbr2hyb4vkqe

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
This white paper provides a) a brief introduction to the Edge computing concept, b) an exhaustive technology review focusing on virtualisation, orchestration, network control, and operational frameworks  ...  The 5G PPP Initiative and the 5GIA are happy to present a new white paper entitled "Edge Computing for 5G Networks".  ...  Integrity and remote attestation Remote attestation is a technique that has gain momentum in Telco NFV environment because it generates trust and liability for the NFVI and VNFs.  ... 
doi:10.5281/zenodo.3698117 fatcat:zjbuceqquzfchcylpgacwgxjpa

Impact of Single Sign-on Adoption in an Assessment Triage Unit

Neely James, Shruti Marwaha, Stacie Brough, Thomas T. John
2020 Journal of Nursing Administration  
Further complexity is added to clinical workflows if clinicians must log into smart devices frequently without a simple solution for access and data security.  ...  The purpose of this study was to measure the average time required and time savings when taking vital sign measurements using the Single Sign-On (SSO) (badge scan and go) on the electronic medical record-connected  ...  architectures and operating systems for safety critical systems which are higher assurance, more interoperable, and supported for longer periods of time).  ... 
doi:10.1097/nna.0000000000000860 pmid:32068624 fatcat:3bineupfebgm3nawvly6jct6uu

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from  ...  Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.  ...  An attacker can exploit classic vulnerabilities of IoT devices to compromise the molecular control system remotely.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
Basic Operational Medical Research Science (DARPA).  ...  Efforts focus on identified medical gaps in warfighter carerelated to health monitoring and preventing the spread of infectious disease.  ...  -Demonstrate feasibility of discriminating between known/unknown code executing on a simple IoT-type device assuming knowledge of the firmware.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

ARPA Whitepaper [article]

Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018 arXiv   pre-print
With state-of-the-art multiparty computation protocol and a layer2 solution, our privacy-preserving computation guarantees data security on blockchain, cryptographically, while reducing the heavy-lifting  ...  This breakthrough has several implications on the future of decentralized networks.  ...  The remote attestation does not prevent a malicious cloud service provider from first faithfully responding to remote attestation queries, but then emulate the rest of the protocol (such as KeyGen and  ... 
arXiv:1812.05820v1 fatcat:wpu3uxpo6vcftomeeeufovd3ai

Social media and news media: Building new publics or fragmenting audiences? [chapter]

Kathryn Bowd
2016 Making Publics, Making Places  
The significance of connectedness We take up the above concerns and explore them in relation to three properties of connectedness which have emerged from our study.  ...  The authors would like to thank the research participants for their enthusiasm, time and support. Participant permission has been granted for the use of images in this publication.  ...  Citizen awareness, education, understanding and consent to data-driven experiences enabled by the IoT are being seen as critical to a city's success.  ... 
doi:10.20851/publics-08 fatcat:rahwycul35e6rdw75j2nn4taie

Incentivizing User-centric Resource Allocation in Wireless Networks in Realtime

Madhumitha Harishankar
2021
I consider a series of practical motivating contexts that progressively require lesser trust and reliance on the network provider and allow for more flexible connectivity schemes benefitting end-devices  ...  Second, I consider a user-driven approach to acquiring network resources by proposing a model wherein a slice of resources is dynamically created and assigned to a device based on the session needs itspecifies  ...  Impact on IoT Devices.  ... 
doi:10.1184/r1/14668428 fatcat:agvwuvb43revhm2agsfexwvok4

Secure System Virtualization: End-to-End Verification of Memory Isolation [article]

Hamed Nemati
2020 arXiv   pre-print
Over the last years, security kernels have played a promising role in reshaping the landscape of platform security on today's ubiquitous embedded devices.  ...  They reduce the software portion of the system's trusted computing base to a thin layer, which enforces isolation between low- and high-criticality components.  ...  First, security is becoming an increasingly important aspect of new devices such as smartphones and Internet of Things (IoT) systems.  ... 
arXiv:2005.02605v1 fatcat:h7sdyjoxyrexhaswjns5mcfdey

Information Technology Data Standards in Cardiology What, Why, and How Come

H Vernon Anderson
2016 US Cardiology Review  
Data and data elements are the building blocks of what we call information.  ...  Computers are the necessary substrate for everything that occurs in cardiology and all of medicine, yet computer technology has been implemented in a piecemeal manner.  ...  For example, telecommunications technology can be used to remotely deliver health and health care services and improve access to care across clinical and non-clinical community settings; and medical device  ... 
doi:10.15420/usc.2016.10.1.43 fatcat:dm2g44bw35bzzbu7pvj5hbd674

3. Security, Privacy and Oversight [chapter]

Charles D. Raab
2017 Security in a Small Nation: Scotland, Democracy, Politics  
The fastest growing category of IOT is wearable devices.  ...  More complex operations may involve exploiting vulnerabilities in software in order to gain control of devices or networks to remotely extract information, monitor the user of the device or take control  ...  The fraud was complex and well organised, operating from call centres in Spain.  ... 
doi:10.11647/obp.0078.03 fatcat:rlqnonssvjempadjo6waotmpgu

Legal Education in the Blockchain Revolution

Mark Fenwick, Wulf A. Kaal, Erik P. M. Vermeulen
2017 Social Science Research Network  
It proposes eight scenarios for the application of the Blockchain in an education context, based on the current state of technology development and deployment. i  ...  Blockchain focusing on its potential for the education sector.  ...  Acknowledgements This study benefited from the input and collaboration of stakeholders and experts throughout Europe and elsewhere, to whom the project team would like to express its gratitude.  ... 
doi:10.2139/ssrn.2939127 fatcat:7jvxzzixazf77hpevogzuuwtn4

The governance of public service delivery across territories [chapter]

OECD
2021 OECD Rural Studies  
This report, through its compilation of good policy practices and innovations to deliver education and health care services to citizens living in different geographies, especially in remote rural places  ...  This report highlights the critical role that subnational governments and local organisations can play in that process and their ability, by tailoring delivery models to leverage local strengths, to generate  ...  One example is in Sweden, where doctors are offering patients a wearable real-time, remote cardiac and respiratory monitoring device that leverages cloud computing to enable physicians to remotely detect  ... 
doi:10.1787/9d35c12e-en fatcat:qa2aiajwirgcbjyjxl7t5efkcq
« Previous Showing results 1 — 15 out of 75 results