Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








11,329 Hits in 4.5 sec

Architectural support for protecting user privacy on trusted processors

Youtao Zhang, Jun Yang, Yongjing Lin, Lan Gao
2005 SIGARCH Computer Architecture News  
Recently proposed trusted processor model is a promising model for building secure applications.  ...  In this paper, we identify the threat model to user privacy and propose a new scheme for user privacy protection.  ...  In this paper, we propose a new mechanism for protecting user privacy on trusted processors.  ... 
doi:10.1145/1055626.1055642 fatcat:kb3aa5odsrgdpc32foxgc2n4im

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment

Yuanfeng Wen, JongHyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh
2013 Proceedings of the ACM International Conference on Computing Frontiers - CF '13  
trusted?  ...  In this paper, we propose an architectural solution to the above problem in multi-processor cloud environments.  ...  The main contributions of our work are: (i) design of an architectural solution for enhancing VM privacy protection in "untrusted" cloud environments; (ii) architectural solution for privacy protection  ... 
doi:10.1145/2482767.2482799 dblp:conf/cf/WenLLZSXS13 fatcat:xg6lndxekjh4xdfen6ebkamcka

User Privacy Framework for Web-of-Objects based Smart Home Services

Muhammad Ansar Latif, Farman Ullah, Hynwoo Lee, Won Ryu, Sungchang Lee
2015 International Journal of Smart Home  
We propose Smart Home Web of Object User Privacy (SWOPR) architecture to protect and control the release of user PIIs according to the user consent.  ...  The SWOPR introduces Smart Home Web of Objects Privacy Controller (SWOPC) and Privacy Processor (SWOPP) nodes.  ...  [21] provided SOAP-based user centric smart home privacy framework to support users roaming freely in the smart home environment and focused on how a user can build up trust into inherently un-trusted  ... 
doi:10.14257/ijsh.2015.9.5.07 fatcat:fwciappzizh63flbohpnumoboi

Privacy in location-based services

Chi-Yin Chow, Mohamed F. Mokbel
2009 SIGSPATIAL Special  
With the location anonymizer, the trusted third party architecture supports three new query types for privacy-preserving LBS [23] , namely, private queries over public data (e.g., a person (private query  ...  Then, the query processing will be similar to the one used in the trusted third party architecture.  ... 
doi:10.1145/1567253.1567258 fatcat:hwe47hijs5acrbizc25wyx5iny

Applying digital rights management systems to privacy rights management

Steve Kenny, Larry Korba
2002 Computers & security  
In particular, the goal of this work is the adaptation of DRM technology to produce a privacy management architecture that reflects the requirements of Directive 95/46/ECfor the protection of personal  ...  In this paper we examine the prospect of adapting systems developed for Digital Rights Management to meet the challenges of Privacy Rights Management.  ...  Also we have very special thanks to Hari Reddy (OASIS Rights Language Technical Committee, Chairperson) and Guillermo Lao of ContentGuard for their help with XrML extensions for privacy rights management  ... 
doi:10.1016/s0167-4048(02)01117-3 fatcat:ghc6ina3b5c53iktbkyskofbxq

Towards Meeting the Privacy Challenge: Adapting DRM [chapter]

Larry Korba, Steve Kenny
2003 Lecture Notes in Computer Science  
There are many requirements for achieving the privacy needs as expressed in law. Currently there is no commonly accepted technical approach for meeting these privacy requirements.  ...  In this paper, we examine the prospect of adapting systems designed for Digital Rights Management for the purpose of Privacy Rights Management for European Community application.  ...  DRM architectures support description, trading, protection, monitoring and tracking of the use of digital content.  ... 
doi:10.1007/978-3-540-44993-5_8 fatcat:wtt2kkuc3rhn3jnpkihas4enym

Location privacy based on trusted computing and secure logging

Urs Hengartner
2008 Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08  
We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism.  ...  Trusted Computing lets an operator query the configuration of a location-based service.  ...  Acknowledgments We thank the anonymous reviewers for their comments. This work is supported by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1145/1460877.1460898 dblp:conf/securecomm/Hengartner08 fatcat:rwm5teofjvacnen52wvcfx3z7y

Position Paper: A Path Towards Ubiquitous Protection of Media

Ronald Toegl, Johannes Winter, Martin Pirker
2013 Trust and Trustworthy Computing  
Our approach aims to support the needs of the different stakeholders, with respect to openness, content protection and client privacy.  ...  Mobile devices have become powerful and user-friendly. At the same time they have become a hosting platform for a wide variety of services.  ...  This work was supported by the EC, through project FP7-ICT-STANCE, grant agreement number 317753, and project DALIA of the AAL joint programme.  ... 
dblp:conf/trust/ToeglWP13 fatcat:blplznahqbgtrhfjcqxc72gzqa

Privacy and DRM Requirements for Collaborative Development of AI Applications

Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku
2018 Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018  
Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines.  ...  This data usage, however, raises intrinsically the concerns on data privacy.  ...  For instance, they mapped content owner to data subject, content distributor to controller, and user to processor.  ... 
doi:10.1145/3230833.3233268 dblp:conf/IEEEares/MehriIT18 fatcat:wdfqhexy2jhetf5xwegt5s4tqa

MyCloud

Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy.  ...  Privacy concern is still one of the major issues that prevent users from moving to public clouds.  ...  We thank anonymous reviewers for their insightful comments that helped us to greatly improve the paper. Meng Yu was partially funded by NSF CNS-1100221 and NSF IIP-1342664.  ... 
doi:10.1145/2523649.2523680 dblp:conf/acsac/LiZBYL13 fatcat:rpzvqzcidnbgfmtpntf6hrrayu

Data Protection and Data Sharing in Telematics

Sastry Duri, Jeffrey Elliott, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang
2004 Journal on spesial topics in mobile networks and applications  
We have implemented the core component, the privacy engine, to help users manage their privacy policies and to authorize data requests based on policy matching.  ...  Some existing approaches focus on protecting privacy through anonymous interactions or by stopping information flow altogether.  ...  Chou for their support and encouragement.  ... 
doi:10.1023/b:mone.0000042507.74516.00 fatcat:6odtbiqmsnbrvpvso4i6wtvlpm

Hardware Platform Security for Mobile Devices

Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, Thomas Nyman
2022 Foundations and Trends® in Privacy and Security  
Platform security mechanisms help to isolate applications from one another, protect persistent data and other ondevice resources (like access to location or peripherals), and  ...  Such wide-ranging scope of use also means widely different security and privacy requirements for those uses.  ...  Additional hardware support for protecting high-value assets is justifiable.  ... 
doi:10.1561/3300000024 fatcat:cw6shvbrvred3c5wyomwpympt4

Blockchain for Transparent Data Management Toward 6G

Xuemin Sherman Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying
2021 Engineering  
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G).  ...  Third, we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing.  ...  Acknowledgments This work was supported by research grants from Huawei Technologies Canada and from the Natural Sciences and Engineering Research Council (NSERC) of Canada.  ... 
doi:10.1016/j.eng.2021.10.002 fatcat:azcky5qo3faadokpplre52ovwq

AEGIS

G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas
2003 Proceedings of the 17th annual international conference on Supercomputing - ICS '03  
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks.  ...  Our architecture assumes that all components external to the processor, such as memory, are untrusted. We show two different implementations.  ...  We would also like to thank Ron Rivest and Krste Asanovic for many constructive comments, as well as all the members of our group who helped proof-read this paper.  ... 
doi:10.1145/782814.782838 dblp:conf/ics/SuhCGDD03 fatcat:qxgo3jshfng5vkowxbifl7go44

Privacy‐aware cloud ecosystems: Architecture and performance

Masoud Barati, Omer Rana
2020 Concurrency and Computation  
Understanding the impact on data privacy of a user for such a composite service remains a challenge, and providing transparency (and obtaining user consent for data use) remains a key requirement of the  ...  K E Y W O R D S blockchain, cloud architecture, data privacy, general data protection regulation, smart contracts INTRODUCTION With increasing number of on-line services, often hosted over cloud infrastructure  ...  ACKNOWLEDGMENT The work reported in this article has been funded by EPSRC under grant EP/R033439/1, Project title: "PACE: Privacy-aware Cloud Ecosystems."  ... 
doi:10.1002/cpe.5852 fatcat:2qus22njc5fjbpaeahqtl5uclm
« Previous Showing results 1 — 15 out of 11,329 results