A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Architectural support for protecting user privacy on trusted processors
2005
SIGARCH Computer Architecture News
Recently proposed trusted processor model is a promising model for building secure applications. ...
In this paper, we identify the threat model to user privacy and propose a new scheme for user privacy protection. ...
In this paper, we propose a new mechanism for protecting user privacy on trusted processors. ...
doi:10.1145/1055626.1055642
fatcat:kb3aa5odsrgdpc32foxgc2n4im
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment
2013
Proceedings of the ACM International Conference on Computing Frontiers - CF '13
trusted? ...
In this paper, we propose an architectural solution to the above problem in multi-processor cloud environments. ...
The main contributions of our work are: (i) design of an architectural solution for enhancing VM privacy protection in "untrusted" cloud environments; (ii) architectural solution for privacy protection ...
doi:10.1145/2482767.2482799
dblp:conf/cf/WenLLZSXS13
fatcat:xg6lndxekjh4xdfen6ebkamcka
User Privacy Framework for Web-of-Objects based Smart Home Services
2015
International Journal of Smart Home
We propose Smart Home Web of Object User Privacy (SWOPR) architecture to protect and control the release of user PIIs according to the user consent. ...
The SWOPR introduces Smart Home Web of Objects Privacy Controller (SWOPC) and Privacy Processor (SWOPP) nodes. ...
[21] provided SOAP-based user centric smart home privacy framework to support users roaming freely in the smart home environment and focused on how a user can build up trust into inherently un-trusted ...
doi:10.14257/ijsh.2015.9.5.07
fatcat:fwciappzizh63flbohpnumoboi
Privacy in location-based services
2009
SIGSPATIAL Special
With the location anonymizer, the trusted third party architecture supports three new query types for privacy-preserving LBS [23] , namely, private queries over public data (e.g., a person (private query ...
Then, the query processing will be similar to the one used in the trusted third party architecture. ...
doi:10.1145/1567253.1567258
fatcat:hwe47hijs5acrbizc25wyx5iny
Applying digital rights management systems to privacy rights management
2002
Computers & security
In particular, the goal of this work is the adaptation of DRM technology to produce a privacy management architecture that reflects the requirements of Directive 95/46/ECfor the protection of personal ...
In this paper we examine the prospect of adapting systems developed for Digital Rights Management to meet the challenges of Privacy Rights Management. ...
Also we have very special thanks to Hari Reddy (OASIS Rights Language Technical Committee, Chairperson) and Guillermo Lao of ContentGuard for their help with XrML extensions for privacy rights management ...
doi:10.1016/s0167-4048(02)01117-3
fatcat:ghc6ina3b5c53iktbkyskofbxq
Towards Meeting the Privacy Challenge: Adapting DRM
[chapter]
2003
Lecture Notes in Computer Science
There are many requirements for achieving the privacy needs as expressed in law. Currently there is no commonly accepted technical approach for meeting these privacy requirements. ...
In this paper, we examine the prospect of adapting systems designed for Digital Rights Management for the purpose of Privacy Rights Management for European Community application. ...
DRM architectures support description, trading, protection, monitoring and tracking of the use of digital content. ...
doi:10.1007/978-3-540-44993-5_8
fatcat:wtt2kkuc3rhn3jnpkihas4enym
Location privacy based on trusted computing and secure logging
2008
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08
We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism. ...
Trusted Computing lets an operator query the configuration of a location-based service. ...
Acknowledgments We thank the anonymous reviewers for their comments. This work is supported by the Natural Sciences and Engineering Research Council of Canada. ...
doi:10.1145/1460877.1460898
dblp:conf/securecomm/Hengartner08
fatcat:rwm5teofjvacnen52wvcfx3z7y
Position Paper: A Path Towards Ubiquitous Protection of Media
2013
Trust and Trustworthy Computing
Our approach aims to support the needs of the different stakeholders, with respect to openness, content protection and client privacy. ...
Mobile devices have become powerful and user-friendly. At the same time they have become a hosting platform for a wide variety of services. ...
This work was supported by the EC, through project FP7-ICT-STANCE, grant agreement number 317753, and project DALIA of the AAL joint programme. ...
dblp:conf/trust/ToeglWP13
fatcat:blplznahqbgtrhfjcqxc72gzqa
Privacy and DRM Requirements for Collaborative Development of AI Applications
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018
Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. ...
This data usage, however, raises intrinsically the concerns on data privacy. ...
For instance, they mapped content owner to data subject, content distributor to controller, and user to processor. ...
doi:10.1145/3230833.3233268
dblp:conf/IEEEares/MehriIT18
fatcat:wdfqhexy2jhetf5xwegt5s4tqa
MyCloud
2013
Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13
The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy. ...
Privacy concern is still one of the major issues that prevent users from moving to public clouds. ...
We thank anonymous reviewers for their insightful comments that helped us to greatly improve the paper. Meng Yu was partially funded by NSF CNS-1100221 and NSF IIP-1342664. ...
doi:10.1145/2523649.2523680
dblp:conf/acsac/LiZBYL13
fatcat:rpzvqzcidnbgfmtpntf6hrrayu
Data Protection and Data Sharing in Telematics
2004
Journal on spesial topics in mobile networks and applications
We have implemented the core component, the privacy engine, to help users manage their privacy policies and to authorize data requests based on policy matching. ...
Some existing approaches focus on protecting privacy through anonymous interactions or by stopping information flow altogether. ...
Chou for their support and encouragement. ...
doi:10.1023/b:mone.0000042507.74516.00
fatcat:6odtbiqmsnbrvpvso4i6wtvlpm
Hardware Platform Security for Mobile Devices
2022
Foundations and Trends® in Privacy and Security
Platform security mechanisms help to isolate applications from one another, protect persistent data and other ondevice resources (like access to location or peripherals), and ...
Such wide-ranging scope of use also means widely different security and privacy requirements for those uses. ...
Additional hardware support for protecting high-value assets is justifiable. ...
doi:10.1561/3300000024
fatcat:cw6shvbrvred3c5wyomwpympt4
Blockchain for Transparent Data Management Toward 6G
2021
Engineering
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). ...
Third, we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. ...
Acknowledgments This work was supported by research grants from Huawei Technologies Canada and from the Natural Sciences and Engineering Research Council (NSERC) of Canada. ...
doi:10.1016/j.eng.2021.10.002
fatcat:azcky5qo3faadokpplre52ovwq
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. ...
Our architecture assumes that all components external to the processor, such as memory, are untrusted. We show two different implementations. ...
We would also like to thank Ron Rivest and Krste Asanovic for many constructive comments, as well as all the members of our group who helped proof-read this paper. ...
doi:10.1145/782814.782838
dblp:conf/ics/SuhCGDD03
fatcat:qxgo3jshfng5vkowxbifl7go44
Privacy‐aware cloud ecosystems: Architecture and performance
2020
Concurrency and Computation
Understanding the impact on data privacy of a user for such a composite service remains a challenge, and providing transparency (and obtaining user consent for data use) remains a key requirement of the ...
K E Y W O R D S blockchain, cloud architecture, data privacy, general data protection regulation, smart contracts INTRODUCTION With increasing number of on-line services, often hosted over cloud infrastructure ...
ACKNOWLEDGMENT The work reported in this article has been funded by EPSRC under grant EP/R033439/1, Project title: "PACE: Privacy-aware Cloud Ecosystems." ...
doi:10.1002/cpe.5852
fatcat:2qus22njc5fjbpaeahqtl5uclm
« Previous
Showing results 1 — 15 out of 11,329 results