We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of Patients) to address these challenges. ...
详细信息
ISBN:
(纸本)1595937676
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of Patients) to address these challenges. SNAP protects the privacy, authenticity, and integrity of medical data, with low-cost energy-efficient mechanisms. We have incorporated the following mechanisms in SNAP: (1)an ECC-based secure key exchange protocol to set up shared keys between sensor nodes and base stations;(2)symmetric encryption and decryption for protecting data con?dentiality and integrity;(3) a two-tier authentication scheme for verifying data source. We have developed a prototype on the Tmote Sky platform for evaluating the proposed architecture and mechanisms. Copyright 2007 acm.
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14,6,21,9], testing set disjointness [17], multi-set operations [18], and set union [16,1,18]. In...
详细信息
ISBN:
(纸本)9783540727378
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14,6,21,9], testing set disjointness [17], multi-set operations [18], and set union [16,1,18]. In this paper, we introduce novel protocols for privacy-preserving set union in the malicious adversary model. More specifically, each participant inputs a set of values, and at the end of the protocol, each participant learns the items that are in at least one participant's set without learning the frequency of the items or which participant(s) contributed specific items. To our knowledge our protocol is the most efficient privacy-preserving set union protocol for the malicious adversary model to date.
We propose a solution for privacy problems regarding use of electronic identification tags such as RFID's. In our scheme the ID tag changes at random driven by its internal circuitry during each activation. the ch...
详细信息
ISBN:
(纸本)9780769527888
We propose a solution for privacy problems regarding use of electronic identification tags such as RFID's. In our scheme the ID tag changes at random driven by its internal circuitry during each activation. the changes are small enough so that the legitimate system can recognize the tag and register the modified ID for the next activation. On the other hand, after a certain number of activations the new ID cannot be linked withthe. original one. We provide a rigid mathematical analysis of security of this unlinkability property.
作者:
Wong, RebeccaGarrie, Daniel B.Senior Lecturer in Law
Nottingham Law School Nottingham Trent University Burton Street Nottingham NG1 4BU United Kingdom Editor-in-Chief
Journal of Technology Risk Management 4580 Klahanie Dr SE Suite 161 Issaquah WA 98029 United States
Clickstream data is an issue that cannot be ignored by non-EEA data controllers, data Protection Authorities, Legislators and the Judiciary. this paper discusses the notion of clickstream data in the context of the Eu...
详细信息
ISBN:
(纸本)9780889866775
Clickstream data is an issue that cannot be ignored by non-EEA data controllers, data Protection Authorities, Legislators and the Judiciary. this paper discusses the notion of clickstream data in the context of the European and U.S. legal framework. It considers the extent to which clickstream data is protected as "personal data" under the European data Protection Directive 95/46/EC and discusses the impact of the Wiretap Act, 18 U.S.C. § 2701 (2004), and related statutes on clickstream data. the paper calls for more discussion by data Protection Authorities into the notion of clickstream data and its application on the Internet.
this proceedings contains 30 papers. this proceedings contains the papers that focused on creating interest in e-Research (or e-Science) and grid computing that is rapidly growing, driven by real-world applications of...
ISBN:
(纸本)192068249X
this proceedings contains 30 papers. this proceedings contains the papers that focused on creating interest in e-Research (or e-Science) and grid computing that is rapidly growing, driven by real-world applications of increasing scale and complexity, which is by supporting e-Research by deploying a national grid infrastructure and working to grid-enable applications in areas such as physics, astronomy, chemistry, geoscience, earth sciences and life sciences. the symposium also featured a keynote address on a grid component model and middleware for distributed objects. the papers covered a variety of topics, including grid middleware and tools, data management and e-Research applications. the key terms of this conference are active adversary model, automated data analysis, CIMA, Clinical management, Collaboration, concept hierarchies, correctness, Crystallography, cyber infrastructure, data collection, element weighting, e-Research, grid, grid computing, grid services, inference-control, information theoretic, Kepler, knowledge base, medical data mining, ontology, OWL, pattern element, privacy preserving data mining, range test, remote access, service oriented architecture, soundness, SRB, TFIDF, web services.
data perturbation with random noise signals has been shown to be useful for data hiding in privacy-preserving data mining. Perturbation methods based on additive randomization allows accurate estimation of the Probabi...
详细信息
ISBN:
(数字)9783540734994
ISBN:
(纸本)9783540734987
data perturbation with random noise signals has been shown to be useful for data hiding in privacy-preserving data mining. Perturbation methods based on additive randomization allows accurate estimation of the Probability Density Function (PDF) via the Expectation-Maximization (EM) algorithm but it has been shown that noise-filtering techniques can be used to reconstruct the original data in many cases, leading to security breaches. In this paper, we propose a generic PDF reconstruction algorithm that can be used on non-additive (and additive) randomization techiques for the purpose of privacy-preserving data mining. this two-step reconstruction algorithm is based on Parzen-Window reconstruction and Quadratic Programming over a convex set - the probability simplex. Our algorithm eliminates the usual need for the iterative EM algorithm and it is generic for most randomization models. the simplicity of our two-step reconstruction algorithm, without iteration, also makes it attractive for use when dealing with large datasets.
We focus on privacy, concerns while dealing with biometrics authentication. Our aim is that no biometrics should be leaked during the authentication and that its storage should be secure. Namely, we want to be able to...
详细信息
ISBN:
(纸本)9781424412990
We focus on privacy, concerns while dealing with biometrics authentication. Our aim is that no biometrics should be leaked during the authentication and that its storage should be secure. Namely, we want to be able to securely match two biometric templates by, computing a Hamming distance in a secure way. We propose a new security model for applying biometrics to authentication purposes, and construct a new biometric authentication scheme by exploiting some interesting properties of a new version of the Naccache-Stern knapsack public key, encryption system. Our scheme enjoys a number of appealing properties, especially, human users are not required to store an), secret.
Many business services for private companies and citizens are increasingly accomplished trough the web and mobile devices. As such a scenario is characterized by high dynamism and untrustworthiness, existing technolog...
详细信息
ISBN:
(纸本)9789728865962
Many business services for private companies and citizens are increasingly accomplished trough the web and mobile devices. As such a scenario is characterized by high dynamism and untrustworthiness, existing technologies could be unsuccessful. this paper proposes an approach, inspired to the front-end trust filter paradigm, to manage dataprivacy in a very flexible way. Our approach has the potential to reduce the change impact due to the dynamism and to foster the reuse of strategies, and their implementations, across organizations.
this paper introduces a concept of increasing securing in the Physical layer (PHY) of wireless communication. It gives a short description of current status of wireless standards and their security. Despite the existe...
详细信息
An increasing amount of E-health software packages are being bundled with Standard Query Language (SQL) databases as a means of storing Electronic Medical Records (EMR's). these databases allow medical practitione...
详细信息
暂无评论