Filters








1,938 Hits in 4.4 sec

Trustworthy AI Inference Systems: An Industry Research View [article]

Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen (+16 others)
2020 arXiv   pre-print
For example, we highlight opportunities and challenges in AI systems using trusted execution environments combined with more recent advances in cryptographic techniques to protect data in use.  ...  Finally, we outline areas of further development that require the global collective attention of industry, academia, and government researchers to sustain the operation of trustworthy AI inference systems  ...  Integration. There is a need and opportunity to increase the integration of privacy-preserving building blocks in established ML development tools such as ML frameworks and graph compilers.  ... 
arXiv:2008.04449v1 fatcat:2loel5z6wnhabolegry4gff7oq

Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy

Rameez Asif, Kinan Ghanem, James Irvine
2020 Sensors  
In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and  ...  It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy  ...  and cost effective seamless integration.  ... 
doi:10.3390/s21010028 pmid:33374599 pmcid:PMC7793093 fatcat:h2b4djvqojdehjxrku4nkjl2dq

Towards a New Paradigm for Privacy and Security in Cloud Services [article]

Thomas Loruenser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Huebner, Thomas Gross, Thomas Langer, Mathieu des Noes, Henrich C. Poehls, Boris Rozenberg, Daniel Slamanig
2015 arXiv   pre-print
We present a new approach towards a next generation of security and privacy enabled services to be deployed in only partially trusted cloud infrastructures.  ...  The market for cloud computing can be considered as the major growth area in ICT.  ...  (vi) Advanced format and order preserving encryption and tokenisation schemes for seamless integration of encryption into existing cloud services.  ... 
arXiv:1506.05980v2 fatcat:bv6ziphc7jfshhwkfqlrp57iim

On an innovative architecture for digital immunity passports and vaccination certificates [article]

John C. Polley, Ilias Politis, Christos Xenakis, Adarbad Master, Michał Kępkowski
2021 Zenodo  
It can be used to evaluate the risk of allowing individuals to return to work, travel, and public life activities.  ...  and security challenges, by proposing an architecture that provides to individuals, employers, and government agencies, a digital, decentralized, portable, immutable, and non-refutable health status cryptographic  ...  The platform's seamless integration with current networks and services is ensured by leveraging widely established and well-known technologies/standards of identity, access management, trusted storage  ... 
doi:10.5281/zenodo.5082625 fatcat:z4sfvx5revfgdbqzat42vqzwaq

On an innovative architecture for digital immunity passports and vaccination certificates [article]

John C. Polley, Ilias Politis, Adarbad Master, Michał Kępkowski
2021 arXiv   pre-print
It can be used to evaluate the risk of allowing individuals to return to work, travel, and public life activities.  ...  and security challenges, by proposing an architecture that provides to individuals, employers, and government agencies, a digital, decentralized, portable, immutable, and non-refutable health status cryptographic  ...  The platform's seamless integration with current networks and services is ensured by leveraging widely established and well-known technologies/standards of identity, access management, trusted storage  ... 
arXiv:2103.04142v4 fatcat:2turzkygx5fpfamqs7suugdspy

A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies

Lavanya-Nehan Degambur, Sheeba Armoogum, Sameerchand Pudaruth
2022 International Journal of Advanced Computer Science and Applications  
The results obtained define several sets of criteria to evaluate the requirements of cryptographic techniques and propose an implementation framework across an end-to-end cloud-based e-learning architecture  ...  Cloud computing has embellished the base platform for the future of elearning, however, security and privacy remains a major concern.  ...  For future work, a theoretical framework will be implemented via a holistic approach using different cryptographic techniques. This will lead the pathway to practical implementations of the framework.  ... 
doi:10.14569/ijacsa.2022.0130108 fatcat:cl4ozumjzvh5pecsqsgoqdvrui

Security and trust in the 6G era

Volker Ziegler, Peter Schneider, Harish Viswanathan, Michael Montag, Satish Kanugovi, Ali Rezaki
2021 IEEE Access  
ACKNOWLEDGMENT The authors would like to thank a number of colleagues at Nokia Bell Labs with whom they had numerous discussions about security and trust for the 2030s.  ...  Urban for their comments on an early draft of this article. They would also like to thank A. Hu for helping with the preparation of the manuscript.  ...  of platform integrity and embedded anchor of trust technologies as described.  ... 
doi:10.1109/access.2021.3120143 fatcat:g5iqzb224zbq3kmsjqph5ygz5a

Towards on blockchain standardization including blockchain as a service

Kangchan Lee
2017 Journal of Security Engineering  
This paper introduces blockchain technology, standardization, and its relationship with cloud computing. Also, it provides the considerations for blockchain as a service as a new standard.  ...  Blockchain can be used to record transaction data and act as an encrypted and immutable digital history of anything from cryptocurrencies such as Bitcoin and Ethereum.  ...  But, The integration of cloud computing with block chains is expected to increase in the future according to the proliferation of blockchain.  ... 
doi:10.14257/jse.2017.06.05 fatcat:t3pb4tjqmbazfprq4k7merjkcu

Third Party Privacy Preserving Protocol for Secure Web Services

B. Raghuram, S. Sandeep, B. Hanmanthu
2013 International Journal of Computer Applications  
In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols.  ...  In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used and in case of the multi party based protocols data perturbed  ...  This allows the data to be seamlessly exchanged not considering of where the client is in the network using world wide web. But same seamless integration will provide certain problem of privacy.  ... 
doi:10.5120/14099-2118 fatcat:dnahpbnennc6xhqvjr4ncqis3u

Secure Roaming Authentication Mechanism for Wi-Fi Based Networks

Tahadray Jean Tsitaitse, Yongquan Cai, Shaldon Leparan Suntu
2018 International Journal of Innovative Computing, Information and Control  
A severe contest for seamless roaming between inter-domain Wireless Fidelity technologies is to build a trust model in a milieu of several WLAN service providers with varying charging or billing options  ...  A composite layer 2 and web-based authentication method intended to ensure secure transmission of cryptographic keys while maintaining the prevailing WLAN charging options.  ...  In this scenario, the policy engine can be considered as an integral part of the adaptation framework of the authentication process.  ... 
doi:10.24507/ijicic.14.06.2221 fatcat:w4ewow7n3fcuxcn77blkra5qky

INDECT Advanced Security Requirements [article]

Manuel Uruena, Petr Machnik, Maria Martinez, Marcin Niemiec, Nikolai Stoianov
2010 arXiv   pre-print
An overview of features for integrated technologies such as Virtual Private Networks (VPNs), Cryptographic Algorithms, Quantum Cryptography, Federated ID Management and Secure Mobile Ad-hoc networking  ...  This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT.  ...  The work presented in this paper has been funded by the INDECT project (Ref 218086) of the 7th EU Framework Programme.  ... 
arXiv:1009.2491v1 fatcat:cwc7noan4vhbbpezxxposagppu

SealedGRID: Secure and Interoperable Platform for Smart GRID Applications

George Suciu, Mari-Anais Sachian, Alexandru Vulpe, Marius Vochin, Aristeidis Farao, Nikolaos Koutroumpouchos, Christos Xenakis
2021 Sensors  
The authentication in the platform presumes digital certificates using a web of trust.  ...  Access control is a fundamental element of a security infrastructure, and security is based on the principles of less privilege, zero-trust, and segregation of duties.  ...  Acknowledgments: Engineer Cristiana Istrate contributed to this work during the preparation of her master thesis. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21165448 pmid:34450890 pmcid:PMC8402140 fatcat:zi56wbrldva65nyrfmjt3vtglq

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Chalee Vorakulpipat, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk
2017 Security and Communication Networks  
This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security  ...  Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD.  ...  In the context of mobile commerce, cryptography algorithms and standards are taken into account for the purpose of energy-aware consumption [51] . Cryptographic Hash Function.  ... 
doi:10.1155/2017/2057260 fatcat:xbybwhsoqnappf6xotoxo3b4eq

Intercloud Resource Discovery: A Future Perspective using Blockchain Technology

Mekhla Sharma, Ankur Gupta
2019 Journal of Technology Management for Growing Economies  
Intercloud is a single logical entity orchestrating resources from different individual clouds providing on-demand resource provisioning in a seamless manner.  ...  However, achieving efficient resource discovery in the intercloud environment remains a challenging task owing to the heterogeneity of resources and diversity of cloud platforms.  ...  Transactions are cryptographically secured and hence ensure integrity and security. d) Mining: A computational review process done on each distributed block of data connected over the blockchain network  ... 
doi:10.15415/jtmge.2019.102008 fatcat:qt53of5bsvaovcu4bzapw3dhai

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
Through the component paradigm, AMISEC supports different network topologies of TTPs, cryptographic algorithms, protocols, or trust management strategies, resulting in a fully à la carte security infrastructure  ...  We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware.  ...  For all standard cryptographic operations, we relied on the BouncyCastle Java library.  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4
« Previous Showing results 1 — 15 out of 1,938 results