the proceedings contain 25 papers. the special focus in this conference is on privacy and Identity Management for Life. the topics include: Delegation for privacy management from womb to tomb - a European perspective;...
ISBN:
(纸本)9783642142819
the proceedings contain 25 papers. the special focus in this conference is on privacy and Identity Management for Life. the topics include: Delegation for privacy management from womb to tomb - a European perspective;saving on-line privacy (keynote paper);sociality and privacy in online social network sites (keynote paper);the freddi staurs of social networking - a legal approach (keynote paper);distributed privacy-preserving online social network (keynote paper);privacy-respecting access control in collaborative workspaces;a three-dimensional framework to analyse the governance of population registers;use of ePassport for identity management in network-based citizen-life processes;the use of privacy enhancing technologies for biometric systems analysed from a legal perspective;assuring privacy of medical records in an open collaborative environment - a case study of walloon region’s eHealth platform;goal-oriented access control model for ambient assisted living;privacy of outsourced data (keynote paper);sharing data for public security;an analysis for anonymity and unlinkability for a VoIP conversation;digital personae and profiles as representations of individuals;anonymous credentials in web applications;reaching for informed revocation;multilateral privacy in clouds;addressing the privacy paradox by expanded privacy awareness - the example of context-aware services;secure logging of retained data for an anonymity service and adding secure transparency logging to the prime core.
Social networking has become a part of our life. We redundantly share our personal information with people in social networks and Internet. these networks allow users to share just about everything: data, photos, vide...
详细信息
the application of wireless sensor networks (WSNs) in healthcare is one of the most important and rapidly growing areas. One of the most critical security concerns is patients' privacy. Since patients are monitore...
详细信息
the proceedings contain 19 papers. the special focus in this conference is on Cloud computing, data management, Publish-Subscribe and Multicast Systems, Social and location-aware middleware, Reliability and legacy, Tr...
ISBN:
(纸本)3642169546
the proceedings contain 19 papers. the special focus in this conference is on Cloud computing, data management, Publish-Subscribe and Multicast Systems, Social and location-aware middleware, Reliability and legacy, Trust and security and Transactional memory. the topics include: A slot allocation scheduling optimizer for mapreduce workloads;adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;enforcing power budget in shared data centers;a dynamic data middleware cache for rapidly-growing scientific repositories;privacy and integrity preserving data aggregation;middleware for a re-configurable distributed archival store based on secret sharing;parametric subscriptions for content-based publish/subscribe networks;a flexible infrastructure for wide-area collaborative applications;fast, reliable application layer multicast for flash dissemination;the gossple anonymous social network;user-controlled P2P social data management for socially-aware applications;a translucent positioning middleware supporting adaptation of internal positioning processes;fault localization in large-scale Peer-to-Peer systems;bridging the gap between legacy services and web services;enforcing End-to-End applicationsecurity in the cloud;lightweight freerider-tracking in gossip;distributed middleware enforcement of event flow security policy;automatically generating symbolic prefetches for distributed transactional memories and asynchronous lease-based replication of software transactional memory.
In order to conduct an automated network infrastructure discovery yielding a complete description of the network and its components as possible, it is necessary to analyze data flows and services provided in the netwo...
详细信息
ISBN:
(纸本)9781841022598
In order to conduct an automated network infrastructure discovery yielding a complete description of the network and its components as possible, it is necessary to analyze data flows and services provided in the network. However, if such an analysis is done without restrictions, it may also capture, process and store personal data of network users. therefore, such an analysis could be illegal according to data protection norms as personal rights of users might be affected. In this paper, we identify the relevant German data protection norms in such scenarios and subsequently analyze the applicability of these norms to the layers of the network reference model. Furthermore, we study the relevance of application layer protocol header fields for some protocols and evaluate whether and in which cases the use of such fields is allowed with respect to data protection norms. Our main emphasis is the trade-off between data protection and legitimate IT security interests when conducting an automated network infrastructure analysis.
security coprocessor can offer special and customized security guarantee for computing and communication system. In most of the application fields, the coprocessor should be small-area, low-power, low-cost and high-av...
详细信息
ISBN:
(纸本)9781424450466
security coprocessor can offer special and customized security guarantee for computing and communication system. In most of the application fields, the coprocessor should be small-area, low-power, low-cost and high-availability, which can not only provide various candidate encryption algorithms, but also with acceptable performance according to the application requirement. In the view of this context, we propose a kind of new system architecture for security coprocessor based on reconfiguration, scalability and tightly coupled structure ideas, which can achieve various encryption operations with easy upgrade and reconfiguration. On the other hand, the security coprocessor can also mitigate the contention of data bus and raise the transfer data rate through the optimized internal data bus network the new architecture can greatly reduce the area and power consumption of the security coprocessor, and improve the adaptability, flexibility and security of the whole system. At the end of this paper, a security coprocessor is implemented in 0.13-mu m CMOS technology to verify the ideas of the paper, where different encryption algorithms are realized through changing the content of instruction set registers. the core area of the improved security module is 56K gates at 100MHz with an average power of 83mW. Comparing with traditional work, we achieve equal security function with lower power, smaller size and easier reconfiguration.
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. this includes system state integrity and the secure lin...
详细信息
ISBN:
(纸本)9780769539652
Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. this includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage.
In this paper, we propose a secure and privacy-preserving Service Oriented Architecture (SOA) for health information integration and exchange in which patients are "part owners" of their medical records, hav...
详细信息
In this paper, we propose a secure and privacy-preserving Service Oriented Architecture (SOA) for health information integration and exchange in which patients are "part owners" of their medical records, have complete ownership of their integrated health information and decide when and how data is modified or exchanged between healthcare providers or insurance companies. this architecture is different from integrated Personal Health Record (PHR) such as Google Health and Microsoft HealthVault in that electronic health records are not stored in online databases but instead are aggregated on-demand using web service requests. Web service providers working on behalf of the patients do not keep copies of the complete EHR but instead provide a pass-through service, and would require PKI-based security certificates to initiate health information exchange.
the Multiple Classifier Systems are nowadays one of the most promising directions in pattern recognition. there are many methods of decision making based on classifier groups. the most popular are those methods that h...
详细信息
E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. application of electronic approach in completing an e-Procurement process opens up a lo...
详细信息
ISBN:
(纸本)9780769539652
E-Government can provide a citizen with better and/or more convenient services as opposed to the traditional government services. application of electronic approach in completing an e-Procurement process opens up a lot of issues regarding security. the transparent nature of the process at hand is requiring a sophisticated security system. Unauthorized access or different kinds of intrusion present a legitimate threat. On the other hand, the attempt to develop such a system in developing countries like Serbia may face many difficulties. Some of the difficulties may be caused by legal obstacles, technical weaknesses, or human resistance towards change. this paper presents a review of authentication techniques used in the European e-Government systems and according to that this paper is focused on the methods we used to overcome those difficulties, as well as on the provision of a strong security system that would guarantee the protection of sensitive data.
暂无评论