this paper dealt with several security aspects in multimedia systems. the possible threads of various attacks are summarized and described. the methods focused on the intrusion detection and protection, the tools that...
详细信息
ISBN:
(纸本)9781467329934
this paper dealt with several security aspects in multimedia systems. the possible threads of various attacks are summarized and described. the methods focused on the intrusion detection and protection, the tools that manage the trusted use of digital media content (Digital Rights Management - DRM), as well as approaches for user's dataprivacy are also presented in the paper. Within HBB-Next architectural concept the security Manager (SM) architectural component was proposed. this component is responsible for the management of multi-factor authentication, authorization, and policy enforcement for "multifactor levels" and for profile data access control.
Until today, the protection of personal data is mainly left to the legislation by means of guidelines. this paper aims to increase the perceived control by users over their data by helping the user's agent to chec...
详细信息
the Internet of things creates an environment where software systems are influenced and controlled by phenomena in the physical world. the goal is invisible and natural interactions with technology. However, if such s...
详细信息
ISBN:
(纸本)9780769548654;9781467351461
the Internet of things creates an environment where software systems are influenced and controlled by phenomena in the physical world. the goal is invisible and natural interactions with technology. However, if such systems are to provide a high-quality personalised service to individuals, they must by necessity gather information about those individuals. this leads to potential privacy invasion. Using techniques from Information Flow Control, data representing phenomena can be tagged withtheir privacy properties, allowing a trusted computing base to control access based on sensitivity and the system to reason about the flows of private data. For this to work well, tags must be assigned as soon as possible after phenomena are detected. Tagging within resource-constrained sensors raises worries that computing the tags may be too expensive and that useful tags are too large in relation to the data's size and the data's sensitivity. this paper assuages these worries, giving code templates for two small microcontrollers (PIC and AVR) that effect meaningful tagging.
this paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the va...
详细信息
the disclosure and misuse of personal information are two major problems of social networking sites. To address these problems, several models focusing on trust or privacy have been proposed. We propose a privacy mode...
详细信息
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica...
详细信息
ISBN:
(纸本)9781450312950
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an application- and application-protocol-independent infrastructure that allows for the enforcement of usage control policies in a distributed environment. We instantiate the infrastructure for transferring files using FTP and for a scenario where smart meters are connected to a Facebook application. Copyright 2012 acm.
Near field communication (NFC) technology can be a desirable technology for implantable medical devices (IMDs) owing to its communication range short enough for privacy and long enough for most IMD insertion locations...
详细信息
Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy. Solution for the above mentioned problems...
详细信息
ISBN:
(纸本)9781450312400
Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy. Solution for the above mentioned problems can be found in application of the ,Hippocratic databases - HDB concept". the idea is inspired by the basic principles of Hippocratic Oath to be applied on the databases in order to provide dataprivacy and confidentiality. Implementation and advantages of this concept have been researched for the needs of business intelligence systems and health information systems, but not of eLearning systems, until now. We have created a prototype model of e-learning environment that fully implements the principles of the HDB database. In order to prove the usability and viability of the model, we compared the performance of the production eLearning system with prototype model. the results of these studies are found in this research paper. Copyright 2012 acm.
Online social networks (OSNs) such as Facebook and Google+ have transformed the way our society communicates. However, this success has come at the cost of user privacy;in today's OSNs, users are not in control of...
详细信息
the proceedings contain 5 papers. the topics discussed include: towards a personalized and distributed in-car infotainment experience using the open and web-based webinos middleware;efficient data sharing for multi-de...
ISBN:
(纸本)9781450316170
the proceedings contain 5 papers. the topics discussed include: towards a personalized and distributed in-car infotainment experience using the open and web-based webinos middleware;efficient data sharing for multi-device multimedia applications;virtual browser for enabling multi-device web applications;follow you follow me: using location tracking to mitigate multi-device privacythreats;and application architectures for smart multi-device applications.
暂无评论