Filters








133 Hits in 3.1 sec

Designing a secure storage repository for sharing scientific datasets using public clouds

Alok Gautam Kumbhare, Yogesh Simmhan, Viktor Prasanna
2011 Proceedings of the second international workshop on Data intensive computing in the clouds - DataCloud-SC '11  
In this paper, we present an architecture for a secure data repository service designed on top of a public Cloud infrastructure to support multi-disciplinary scientific communities dealing with personal  ...  control over private data hosted in the Cloud.  ...  It uses searchable encryption technique to allow the end users to transparently search over the encrypted data.  ... 
doi:10.1145/2087522.2087530 fatcat:a3fkw6ba7fduflnpptegcsns6m

MARLIN: An IoT Sensor Network for Improving Maritime Situational Awareness

Tino Flenker, Jannis Stoppe
2021 Zenodo  
Maritime situational awareness pictures are mostly collections of interfaces for particular sensors, showing a one-onone relationship between sensors and their interface.  ...  broken with this pattern, using unified and open interfaces on sensors and services to instead create modular, interconnected networks to handle the recording, processing and interaction of and with data  ...  One example for local data processing is geo-referencing of image data or converting image data from a raw data format to a standardized image format.  ... 
doi:10.5281/zenodo.5603379 fatcat:qh3w32utjbhmzotn5tndxh45ii

A Survey on Secure Cloud-Based E-Health Systems

Dilip Yadav, Sephali Behera
2018 EAI Endorsed Transactions on Pervasive Health and Technology  
Cloud computing is being used in many applications and several aspects for storing and easy sharing of data.  ...  The e-health data on the cloud should be available only to the data owner. This work presents a literature survey on secure cloud-based e-health systems.  ...  In [84] , dynamic searchable encryption with keyword range search and multi-keyword search (DSEKRSMS) using a privacy-preserving equality test (PET) was used to give a searchable and privacy-preserving  ... 
doi:10.4108/eai.13-7-2018.163308 fatcat:zxjtineopbautdg6nlqr3e4fma

Routes for breaching and protecting genetic privacy

Yaniv Erlich, Arvind Narayanan
2014 Nature reviews genetics  
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy--preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
doi:10.1038/nrg3723 pmid:24805122 pmcid:PMC4151119 fatcat:ypcrolqbtvgabhnp6ufvzpsula

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 bioRxiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
doi:10.1101/000042 fatcat:gnmdq2mc2be7phgvcejoxu5clq

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 arXiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  The authors thank Dina Zielinski and Melissa Gymrek for useful comments and Shriram Sankararaman for his nice introduction between the authors.  ... 
arXiv:1310.3197v1 fatcat:guexdcofhbhmfi2wblenbno5ni

A PROPOSED FRAMEWORK FOR THE INTEGRATION OF E-GOVERNMENT DATA AND SERVICES

Amira Rezk, Sherif Barakat, Sirwan Abdullah
2016 International Journal of Intelligent Computing and Information Sciences  
The data integration and interoperability concern how distinctive gatherings concur on what data to trade, and the definition and representation of such data.  ...  The aim of this work is to improve accessibility and connectivity of governmental services for citizens and by means of creating integrated scenarios and providing guidance to users while following this  ...  Reference source not found.] propose an intervention-based methodology for integrating data from two sorts of data sources, viz. spatial data frameworks, for example, GIS and searchable databases of geo-referenced  ... 
doi:10.21608/ijicis.2016.30054 fatcat:xz7amo2ptzcprodejrqsx6bcey

Community Resources Pub

William O. Pate II
2021 San Antonio Review  
It includes geo-referenced, remote-sensing and earth funded, collaborative project designed primarily to serve students in introductory college history IDEAS is the largest bibliographic database dedicated  ...  Cryptomator encrypts your data quickly convenes educators to embrace an ecosystem of conservation program administered by Farm Letters of Vincent Van Gogh The Sun Magazine Resource Resource Awesome Windows  ... 
doi:10.21428/9b43cd98.5766d81e fatcat:hhqjrcfytfcy3ld4wa4lzgqdri

Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense

Zhikai XU, Hongli ZHANG, Xiangzhan YU, Shen SU
2016 IEICE transactions on information and systems  
Location-based services (LBSs) are useful for many applications in internet of things(IoT). However, LBSs has raised serious concerns about users' location privacy.  ...  For example, in [8] , Zhao et al. proposed a location privacy preserving framework based on searchable encryption (SE).  ...  Unfortunately, this mix-zone approach is not suited for a real-name network. (iv) Encryption [8] , [9] . In this method, users' locations are encrypted and queries are processed using ciphertexts.  ... 
doi:10.1587/transinf.2015inp0001 fatcat:doeaqzksafg5tax3ei6gyl3r6e

Spatio-Temporal Research Data Infrastructure in the Context of Autonomous Driving

Colin Fischer, Monika Sester, Steffen Schön
2020 ISPRS International Journal of Geo-Information  
We provide examples for the handling of datasets, explaining the required data preparation steps for data storage as well as benefits when using the data in the context of scientific tasks.  ...  In this paper, we present an implementation of a research data management system that features structured data storage for spatio-temporal experimental data (environmental perception and navigation in  ...  Acknowledgments: We thank the Leibniz University's Department for IT services (LUIS) for their ongoing support of our IT infrastructure.  ... 
doi:10.3390/ijgi9110626 fatcat:2m3k37bhfrfidic5gcnpy3575i

The ten commandments of translational research informatics

Tim Hulsen, Manisha Desai
2019 Data Science  
Finally, this dataset can be 'reused' for additional research through either the G-DOC platform or GEO.  ...  Moreover, security measures such as multi-factor authentication (MFA) and data encryption are getting more common.  ... 
doi:10.3233/ds-190020 fatcat:cwclv26sj5fztnvir2nliqlbcy

Geo-ethnography: Coupling Geographic Information Analysis Techniques with Ethnographic Methods in Urban Research

Stephen A. Matthews, James E. Detwiler, Linda M. Burton
2005 Cartographica  
This research article focuses on the coupling of geographic information system (GIS) technologies with ethnographic data, an approach we refer to as geo-ethnography.  ...  More specifically, we focus on conceptual and methodological issues we have faced in the process of this integration and on practical strategies for combining qualitative and quantitative research.  ...  for Children and Families, and the Social Security Administration.  ... 
doi:10.3138/2288-1450-w061-r664 fatcat:ctq5kvxgsvfhdclhynvrl6yagq

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage  ...  First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms.  ...  A mechanism for keyword-based and range-queries is integrated to support the searching for searchable items.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

The future of geospatial intelligence

Juergen Dold, Jessica Groopman
2017 Geo-spatial Information Science  
Big data place new restraints on economics, as pressures abound to actually use these data, both in real-time and for longer term strategic analysis and decision-making.  ...  Applications of sensors, robotics, cameras, machine learning, encryption, cloud computing and other software, and hardware intelligence are converging, enabling new ways for organizations and their equipment  ...  Acknowledgments The authors would like to thank the following persons for their inputs and assistance in the development of this work: Burkhardt Boeckem, John Welter, Kristen Christensen, Patrick Holcomb  ... 
doi:10.1080/10095020.2017.1337318 fatcat:dowgvu34gbecllhxevlhnmwq4a

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store.  ...  Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure  ...  A mechanism for keyword-based and range-queries is integrated to support the searching for searchable items.  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty
« Previous Showing results 1 — 15 out of 133 results