The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A common approach in crowdsensing projects consists in using the sensing capabilities of mobile's user devices to collect some data, which is later aggregated and processed by a central collector, and then published in aggregated form. In return, individual users obtain useful information related to the provided data, making the exchange mutually beneficial. This use of crowds provides a framework...
We present an optimization framework that solves constrained multi-agent optimization problems while keeping each agent's state differentially private. The agents in the network seek to optimize a local objective function in the presence of global constraints. Agents communicate only through a trusted cloud computer and the cloud also performs computations based on global information. The cloud computer...
As availability of the mobile has been increased and many providers have started offering Location Based Services (LBS). There is undoubted potential of location-aware computing, but location awareness also comes up with the inherent threats, perhaps the most important of which is location privacy. This tracking of the location information result into unauthorized access of location data of user and...
Mobile cloud computing (MCC) is an emerging trend which combines the benefits of cloud computing with the mobile devices. This new technology not only offers tremendous computing power and storage to the mobile devices with limited processing and storage capabilities but also increases the affordability and reliability. Despite providing various benefits, MCC is still in its early stages in providing...
NoSQL database has been popular in cloud storage and document-oriented database also has attracted much attention as a kind of NoSQL database. This paper introduces document-oriented database-based privacy data protection architecture. This architecture maintains the feature as scheme-free and nested document of document-oriented database, and protects tenants' privacy through split value and confused...
With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the whereabouts of one's friends and relatives. However, issues of trust, security and privacy have hindered the popularity and safety of the systems developed for this purpose. We identify and address the key challenges of enabling...
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But the features of RFID system and the constraints of RFID devices may bring about various security problems. In this paper, we propose a novel cross-layer architecture designed to...
A honeypot is a type of information system that is used to obtain information on intruders in a network. When a honeypot is deployed in front of a firewall, it can serve as an early warning system. When deployed behind the firewall, it can serve as part of a defense-in-depth system and can be used to detect attackers who bypass the firewall and the intrusion detection system (IDS) or threats from...
Worst case execution time analysis based on measurements requires large test suites to obtain reliable numbers. We are thus developing tools to efficiently generate these test sets in a whitebox-testing approach. To make project progress measurable and guard against regressions, a benchmarking suite is sought for. We present a set of requirements that have been collected and outline the design of...
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.