The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
These days, surveillance technologies are a key component of smart and networked cities preventing or detecting crime and giving the residents a sense of safety. On the one hand, safety perceptions can be supported by adequate surveillance technologies (e.g., cameras), however on the other hand, the systematic use of surveillance technologies undermines individual privacy needs. In this empirical...
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence,...
We consider a cloud-based control framework in which individual clients own their local plants that must be controlled by a public authority. Individual clients desire to keep the local state information as private as possible, as long as the cloud-based controller can provide a given level of quality of service. Based on an axiomatic argument, we show that Kramer's notion of causally conditioned...
In order to develop efficient and effective framework for managing any conflict between security and privacy Non-Functional requirements and to reduce risk impact in software system, the goals set by the stakeholders need to be ascertained, and then the modeling language, tools, implementation and validation procedures need to be altered accordingly. Overall, this research is aimed for constructing...
The advent of the Internet of Things (IoT), with modern sensors and sensor-based devices, will significantly stimulate the development of context-aware applications. An effective means to extract higher-level contextual information from sensor data is distributed complex event processing (CEP), which facilitates the analysis of real-time data streams coming from heterogeneous and distributed sources...
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal...
Cyber-physical systems represent an engineering challenge due to their safety and security concerns, particularly those systems involved in critical infrastructure which require some of the highest standards of safety, availability, integrity and security. The complexity of these systems makes the identification and analysis of safety and security requirements challenging. In this paper, we present...
Communities serve as basic structures for understanding the organization of many real-world networks, such as social, biological, collaboration, and communication networks. Recently, community search over large graphs has attracted significantly increasing attention, from simple and static graphs to evolving, attributed, location-based graphs. Different from the well-studied problem of community detection...
Machine Learning and Big Data Analysis are seen as the silver bullet to detect and counteract attacks on critical communication infrastructure. Every message is analysed and is to some degree under suspicion. The principle of innocent until proven guilty does not seem to apply to modern communication usage. On the other hand, criminals would gain easily upper hand in communication networks that are...
This paper investigates the verification ofaccess control policies for SGAC, a new healthcare access-control model, using Alloy and ProB, two first orderlogic model checkers based on distinct technologies.SGAC supports permission and prohibition, ruleinheritance among subjects and resources and conflictsresolution. In order to protect patient privacy while ensuringeffective caregiving in safety-critical...
Privacy is an important issue that has raised particular concerns among many research areas. This issue dramatically increases with the proliferation of the Web services composition paradigm. This is mainly due to the high dynamism and untrustworthiness characteristics of the services to be composed, which impose high levels of risk on the interacting parties. Existing technologies for managing and...
Inspired by the design patterns of object-oriented software architecture, we offer an initial set of “privacy patterns”. Our intent is to describe the most important ways in which software systems can offer privacy to their stakeholders. We express our privacy patterns as class diagrams in the UML (Universal Modelling Language), because this is a commonly-used language for expressing the high-level...
This paper focuses on the problem of distributed sequence prediction in a network of sparsely interconnected agents, where agents collaborate to achieve provably reasonable predictive performance. An expert assisted online learning algorithm in a distributed setup of the consensus+innovations form is proposed, in which the agents update their weights for the experts' predictions by simultaneously...
With the advent of Internet technologies, information privacy has emerged as an important but complicated notion that is difficult to articulate and conceptualize in technological system design. In this study we identify the key baseline factors for designing privacy-enhancing systems from users' perspective. Utilizing Solove's pragmatic approach to investigate global users' conceptualization of information...
Both B2B bartering as well as bartering between individuals is increasingly facilitated through online platforms. However, these platforms lack automation and neglect the privacy of their users by leaking crucial information about their offers and demands. It is in this context that we introduce the first privacy-preserving two-party bartering protocol which is secure against active attackers. As...
In this paper we extend a previous recent work on Ambient Intelligence, deployed into a scenario of Intelligence Shopping Malls, with a privacy layer. In fact nowadays, in the Ambient Intelligence context, privacy issues are more and more considered an urgent and main issue to take care of. The success of this permeated ubiquitous intelligence seems to be strongly correlated to how much the scenario...
WebRTC provides web calling services by enabling communication between browsers in a P2P fashion. To achieve security and enhance user privacy it is essential to define the level of trust between the various entities involved in WebRTC security architecture. The existing P2P trust models are not directly applicable as the characteristics of browser to browser communication are not taken into account...
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility trade-off for information producers due to the need-to-know vs. need-to-hide tension, which must take into account the trustworthiness of the other coalition partners. A balance is often...
Nowadays the information flowing across the different Social Network Sites (SNSs) like Facebook is highly diverse and rich in its content. It is precisely the diversity of the users' contributions to SNSs that makes these platforms attractive and interesting to engage with. Nevertheless, there is a high amount of private and sensitive information being disclosed permanently by these users in order...
While researchers have developed many tools, techniques, and protocols for improving software security, exploits and breaches are only becoming more frequent. Some of this gap between theoretical security and actual vulnerability can be explained by insufficient consideration of human factors, broadly termed usability, when developing these mechanisms. In particular, security mechanisms may be difficult...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.