In this work, a solution is proposed to the problem of crime fighting in a city using a mobile applicationthat gets data in real time and offers risk control, privacy protection and security to the citizens. this app...
详细信息
In this work, a solution is proposed to the problem of crime fighting in a city using a mobile applicationthat gets data in real time and offers risk control, privacy protection and security to the citizens. this application is capable of dealing with requests made by citizens located inside quadrants (areas where the city is divided). the system provides quick responses through police patrols assigned to particular locations. In addition, the system is capable of generating recommendations associated to those sites generating risks to visitors. Finally, the efficiency of using these applications is shown using the response time of the police to security events in the city. (C) 2015the Authors. Published by Elsevier B.V. this is an open access article under the CC BY-NC-ND license (http://***/licenses/by-nc-nd/4.0/).
the Cloud Computing is known for its high availability and low cost in implementation and maintenance. the Users of Cloud often give their secret credential for accessing application and/or data hosted on Cloud enviro...
详细信息
ISBN:
(纸本)9781479917976
the Cloud Computing is known for its high availability and low cost in implementation and maintenance. the Users of Cloud often give their secret credential for accessing application and/or data hosted on Cloud environment. Authentication is today's one of the most challenging issues in the domain of security and privacy for the applications running under Cloud environment. As users' access more than one service, sometimes using common credentials, User feels unsafe about disclosing their identity on the Cloud environment because their information may be used with other application/users to generate knowledge about their activities. In this paper, we propose a model which allows users to authenticate to the service securely and control the disclosure of their attributes. the proposed model offers users' a flexibility to generate instant identity along with credential required to authenticate service provider. the instant identity for each service provider makes tough for them to track user's access patterns. Due to rapid change in identity, service provider may not be able to locate user(s). the proposed model aims to assists the users to preserve privacy of their data.
the proceedings contain 68 papers. the topics discussed include: towards the automatic generation of sign language gestures from d images;stemming impact on Arabic text categorization performance: a survey;drug discov...
ISBN:
(纸本)9781467387491
the proceedings contain 68 papers. the topics discussed include: towards the automatic generation of sign language gestures from d images;stemming impact on Arabic text categorization performance: a survey;drug discovery for breast cancer based on big data analytics techniques;automatic generation of fuzzy logic components for enhancing the mechanism of learner's modeling while using educational games;an educational game for teaching computer architecture: evaluation using learning analytics;a proposal for a user interface with a several-cell refreshable Braille display: a case of a wristwatch-shaped wireless refreshable Braille display;performance analysis of the vehicular ad hoc networks (VANET) routing protocols AODV, DSDV AND OLSR;a choice of relevant association rules based on multi-criteria analysis approach;science communication in D virtual worlds: the science circle alliance in second life;metadata protection scheme for JPEG privacysecurity using hierarchical and group-based models;an automatic video surveillance indexing based on facial feature descriptors;a framework for helping the visually impaired learn and practice math;designing a game generator as an educational technology for the deaf learners;and a mobile agent team works model for HPC big data analysis: fuzzy logic application.
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user'...
详细信息
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user's sensitive data. Further, its popularity also opens a new era of application development; because of which Google's Play Store now contains millions of free Android applications. To use these applications users are bound to give the permission to access their data as a cost of the application. the required permissions, sometimes are genuine (such as location information required by Google map, etc), however in most of the cases they need unnecessary permissions due to which security and the privacy of user are hampered. Considering these facts, in this paper, we proposed a computationally efficient framework to enhance the privacy as well as the security of Android users.
暂无评论