3,763 Hits in 5.0 sec

Tutorials and Keynote Speeches

2020 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)  
Compared with the training in a single powerful machine, our proposed framework is more energy-efficient and fits into devices with limited computation and storage capabilities.  ...  modeling and simulation; agent-directed simulation (including agent simulation, agent=supported simulation, and agent-monitored simulation), cognitive and emotive simulations (including modeling human personality  ...  In this talk, I will illustrate some security and privacy issues arising in emerging scenarios, focusing in particular on the problem of managing data while guaranteeing confidentiality and integrity of  ... 
doi:10.1109/ccci49893.2020.9256572 fatcat:w2nvzf55wfh75nkhziz5hn64z4

Quick Tutorial on TPM 2.0 [chapter]

Will Arthur, David Challener, Kenneth Goldman
2015 A Practical Guide to TPM 2.0  
Privacy is of major importance to enterprises, because losing systems or data that contain personally identifiable information (PII) can cause an enormous loss of money.  ...  Quick Tutorial on TPM 2.0 This chapter describes the major uses of TPM capabilities.  ... 
doi:10.1007/978-1-4302-6584-9_3 fatcat:jeoceqnknzch5hoz6rishrtkyi

Editorial: Third Quarter 2021 IEEE Communications Surveys and Tutorials

Dusit Tao Niyato
2021 IEEE Communications Surveys and Tutorials  
Third Quarter 2021 IEEE COMMUNICATIONS SURVEYS AND TUTORIALS I WELCOME you to the third issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2021.  ...  In particular, these articles survey and tutor various issues in "Wireless Communications," "Internet Technologies," "IoT and M2M," "Network and Service Management and Green Communications," "Network Security  ...  Learning tasks performed at individual devices with their local datasets can reduce data exchange and bandwidth occupation in WCNs and protect data privacy of the devices.  ... 
doi:10.1109/comst.2021.3096677 fatcat:qpxqbs47bfgqngv4367xguz62q

Tutorial: Identity Management Systems and Secured Access Control

Anat Hovav, Ron Berger
2009 Communications of the Association for Information Systems  
Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today's computing environment involves a variety of  ...  Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today's computing environment involves a variety of  ...  In our example, a person might be a patient with high privacy requirements.  ... 
doi:10.17705/1cais.02542 fatcat:lrl5bsk4xjhvlkpsirnvtrz2gq

Security and Privacy in Cloud Computing

Zhifeng Xiao, Yang Xiao
2013 IEEE Communications Surveys and Tutorials  
However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern.  ...  Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario  ...  Therefore, there are potential risks that the confidential data (e.g., financial data, health record) or personal information (e.g., personal profile) is disclosed to public or business competitors.  ... 
doi:10.1109/surv.2012.060912.00182 fatcat:nprdqkomn5fvrlxnwvmlvvtati

Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions

David Eckhoff, Isabel Wagner
2018 IEEE Communications Surveys and Tutorials  
We therefore systematize the application areas, enabling technologies, privacy types, attackers and data sources for the attacks, giving structure to the fuzzy term "smart city".  ...  This overwhelming complexity is one reason why holistic privacy protection only rarely enters the picture.  ...  in IEEE Communications Surveys and Tutorials.  ... 
doi:10.1109/comst.2017.2748998 fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy

Tutorial: Big Data Analytics: Concepts, Technologies, and Applications

Hugh J. Watson
2014 Communications of the Association for Information Systems  
The keys to success with big data analytics include a clear business need, strong committed sponsorship, alignment between the business and IT strategies, a fact-based decision-making culture, a strong  ...  Because of the paradigm shift in the kinds of data being analyzed and how this data is used, big data can be considered to be a new, fourth generation of decision support data management.  ...  Clemons et al. [2014] identify three different ways to characterize privacy and online invasions of privacy. The first way is an uninvited intrusion into a user's personal space.  ... 
doi:10.17705/1cais.03465 fatcat:xj2f36udp5dznpzgbmi47fymfe

Enterprise IT Asset Disposition: An Overview and Tutorial

Shu Schiller, Jeffery Merhout, Rike Sandlin
2016 Journal of the Midwest Association for Information Systems  
Despite the critical importance of ITAD, many enterprises lack a clear understanding of ITAD and its regulations and struggle with the management of ITAD processes.  ...  The aim of ITAD is to maximize the value of investment over the IT asset's entire lifecycle while guaranteeing data security and protecting against environmental liability.  ...  The first deals with corporate governance and related privacy issues over personal data when considering asset disposal and the second deals with environmental issues.  ... 
doi:10.17705/3jmwa.00019 fatcat:yjsejpdeavc5fesgqevtedrlai

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
Enabling Big Data applications, facilitated with high bandwidth and ultra-low latency enhancements of MEC, will generate massive amounts of personal data in the future.  ...  that guarantee user identity privacy GDPR [167] GDPR initiative handling and capturing of data is considered an offence.  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
The blockchain technology has revolutionized the digital currency space with the pioneering cryptocurrency platform named Bitcoin.  ...  We start with fundamental working principles of blockchains and how blockchain-based systems achieve the characteristics of decentralization, security, and auditability.  ...  Blockchain-based solutions provide data management with guaranteed integrity and resilience.  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Federated Learning for Internet of Things: A Comprehensive Survey

Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, H. Vincent Poor
2021 IEEE Communications Surveys and Tutorials  
data privacy concerns.  ...  , and IoT privacy and security.  ...  There are two key domains FL can offer useful services for smart city, including data management and smart grid. 1) FL for Data Management: With its decentralized and privacy-preserved nature, FL has  ... 
doi:10.1109/comst.2021.3075439 fatcat:ycq2zydqrzhibfqyo4vzloeoqy

Managing RFID Data: Challenges, Opportunities and Solutions

Lei Xie, Yafeng Yin, Athanasios V. Vasilakos, Sanglu Lu
2014 IEEE Communications Surveys and Tutorials  
We investigate the research progress in RFID with anti-collision algorithms, authentication and privacy protection protocols, localization and activity sensing, as well as performance tuning in realistic  ...  Focusing on RFID data management, this article provides an overview of current challenges, emerging opportunities and recent progresses in RFID.  ...  AUTHENTICATION AND PRIVACY PROTECTION PROTOCOLS The premise of efficient RFID data management is to guarantee the security and privacy of RFID data.  ... 
doi:10.1109/surv.2014.022614.00143 fatcat:dmqiy5uutne53iqljc5pgobd6i

Security Services Using Blockchains: A State of the Art Survey

Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka
2018 IEEE Communications Surveys and Tutorials  
Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data.  ...  These services include authentication, confidentiality, privacy, and access control list (ACL), data and resource provenance, and integrity assurance.  ...  Privacy is a critical requirement for most of these applications that are involved with personal information or location knowledge.  ... 
doi:10.1109/comst.2018.2863956 fatcat:mxuy2hldufgxnmwvfjvpto7wpa

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  Based on this existing privacy preservation schemes, we survey privacy preservation models, including location privacy, identity privacy, anonymity, traceability, interest privacy, backward privacy, and  ...  With this strategy, when a vehicle changes its pseudonyms, the location privacy can be guaranteed. In the paper [39] , the location privacy is guaranteed using Lite-CA-based public key cryptosystem.  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi

PACS: Personal Access Communications System-a tutorial

A.R. Noerpel, Yi-Bing Lin, H. Sherry
1996 IEEE personal communications  
The Personal Access Communications System (PACS) is an American National Standards Institute common air interface standard developed for the 1.9 GHz PCS band in the United States.  ...  Privacy of a traffic channel is guaranteed by radio link encipherment.  ...  Data bursts are reliably delivered by the LAPR protocol and, as with all PACS data services, enciphered for privacy.  ... 
doi:10.1109/98.511763 fatcat:fl56xcg5afhzbasfxfvpnhopa4
« Previous Showing results 1 — 15 out of 3,763 results