Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Spectrum Access System Privacy.

Zeitschriftenartikel zum Thema „Spectrum Access System Privacy“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Spectrum Access System Privacy" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Clark, Matthew A., und Konstantinos Psounis. „Trading Utility for Privacy in Shared Spectrum Access Systems“. IEEE/ACM Transactions on Networking 26, Nr. 1 (Februar 2018): 259–73. http://dx.doi.org/10.1109/tnet.2017.2778260.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhang, Mengyuan, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong und Junshan Zhang. „Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach“. IEEE Transactions on Industrial Electronics 67, Nr. 8 (August 2020): 7094–103. http://dx.doi.org/10.1109/tie.2019.2938491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ahmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi und Marcos Katz. „Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions“. International Journal of Wireless Information Networks 27, Nr. 1 (28.10.2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.

Der volle Inhalt der Quelle
Annotation:
Abstract In this conceptual paper, we discuss the concept of hospital of the future (HoF) and the requirements for its wireless connectivity. The HoF will be mostly wireless, connecting patients, healthcare professionals, sensors, computers and medical devices. Spaces of the HoF are first characterized in terms of communicational performance requirements. In order to fulfil the stringent requirements of future healthcare scenarios, such as enhanced performance, security, safety, privacy, and spectrum usage, we propose a flexible hybrid optical-radio wireless network to provide efficient, high-performance wireless connectivity for the HoF. We introduce the concept of connected HoF exploiting reconfigurable hybrid optical-radio networks. Such a network can be dynamically reconfigured to transmit and receive optical, radio or both signals, depending on the requirements of the application. We envisage that HoF will consist of numerous communication devices and hybrid optical-radio access points to transmit data using radio waves and visible light. Light-based communications exploit the idea of visible light communications (VLC), where solid-state luminaries, white light-emitting diodes (LEDs) provide both room illumination as well as optical wireless communications (OWC). The hybrid radio-optical communication system can be used in principle in every scenario of the HoF. In addition to the hybrid access, we also propose a reconfigurable optical-radio communications wireless body area network (WBAN), extending the conventional WBAN to more generic and highly flexible solution. As the radio spectrum is becoming more and more congested, hybrid wireless network approach is an attractive solution to use the spectrum more efficiently. The concept of HoF aims at enhancing healthcare while using hospital resources efficiently. The enormous surge in novel communication technologies such as internet of things (IoT) sensors and wireless medical communications devices could be undermined by spectral congestion, security, safety and privacy issues of radio networks. The considered solution, combining optical and radio transmission network could increase spectral efficiency, enhancing privacy while reducing patient exposure to radio frequency (RF). Parallel radio-optical communications can enhance reliability and security. We also discuss possible operation scenarios and applications that can be introduced in HoF as well as outline potential challenges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sun, Guiling, Weijian Zhao, Ruobin Wang und Xuanjie Li. „Design of Ethernet-VLC Data Conversion System Based on FPGA“. International Journal of Computer Theory and Engineering 12, Nr. 3 (2020): 69–73. http://dx.doi.org/10.7763/ijcte.2020.v12.1266.

Der volle Inhalt der Quelle
Annotation:
Visible light communication (VLC) has attracted people's attention due to its wide range of spectrum resources and good privacy in recent year. But research on visible light communication is mostly focused on LED materials, transfer protocol, transmission rates, etc. Lack of research that connect the visible light communications with existing communications methods. In this paper, we propose an Ethernet-visible data conversion system based on FPGA, including Ethernet interface logic, bit-width conversion logic, data buffer logic, and visible light communication transceiver logic. The proposed system achieves Ethernet and visible light access, and realizes 1000Mbps Ethernet data and 625Mbps visible light data conversion. Through buffer control, Ethernet data can be completely and reliably transmitted from high speed to low speed. By defining the structure of visible light communication frame and adding data self-recovery mechanism, data transmission has higher stability on the path of visible light. The feasibility of the system is proved by actual measurements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Vorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn und Visut Savangsuk. „A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives“. Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.

Der volle Inhalt der Quelle
Annotation:
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zong Chen, Joy Iong, und Kong-Long Lai. „Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study“. December 2020 2, Nr. 4 (19.01.2021): 236–45. http://dx.doi.org/10.36548/jscp.2020.4.005.

Der volle Inhalt der Quelle
Annotation:
In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Mitrea, Teodor, Vlad Vasile und Monica Borda. „Mobile Applications - (in) Security Overview“. International conference KNOWLEDGE-BASED ORGANIZATION 25, Nr. 3 (01.06.2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.

Der volle Inhalt der Quelle
Annotation:
Abstract Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, user input handling and also exploring a number of vulnerabilities. While applications provide amazing features and benefits for users, they also represent the main attraction for cyber criminals. In order to have a true picture of the mobile security threat spectrum, this article presents the means of how mobile applications can impact systems security, stability and compromise personal data if they are not handled properly.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Szydłowski, Dariusz, und Kamil Martyniak. „Contemporary threats related to content processing in the cyberspace“. ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 23, Nr. 1 (30.04.2019): 13–17. http://dx.doi.org/10.5604/01.3001.0013.1759.

Der volle Inhalt der Quelle
Annotation:
The Internet, as a social medium has a wide spectrum of applications. In general, the cyberspace serves as a provider of services, a commercial platform and the arena of social networking. On one hand, the Internet offers unlimited possibilities with respect to the access to all sources of information but, on the other hand, it can generate a series of threats to the established social and legal order. The threats may pertain to systems, data security, computer programs, users' privacy and intellectual property. Although the problem is important socially as well as politically, until recently the Polish literature on the subject did not address the issue of counteracting and punishing offences related to electronic data processing widely enough. The motivation behind this paper was recent social discourse on the free flow of information on the Internet and the multiplicity of controversies accompanying this topic.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Petrenko, Christie LM, Jennifer Parr, Carson Kautz, Cristiano Tapparello und Heather Carmichael Olson. „A Mobile Health Intervention for Fetal Alcohol Spectrum Disorders (Families Moving Forward Connect): Development and Qualitative Evaluation of Design and Functionalities“. JMIR mHealth and uHealth 8, Nr. 4 (06.04.2020): e14721. http://dx.doi.org/10.2196/14721.

Der volle Inhalt der Quelle
Annotation:
Background Fetal alcohol spectrum disorders (FASD) affect approximately 2% to 5% of the US population. However, most families are unable to access FASD-informed interventions. Barriers to care include the lack of a knowledgeable and skilled workforce and family-level barriers such as limited financial resources, inability to access childcare, and stigma. As a result, families often try peer-to-peer and self-help support strategies. However, they often take these strategies from disparate sources, which have quite variable intervention quality and empirical support. Objective This study aimed to initiate systematic development and evaluation of a mobile health intervention (app) for caregivers raising children with FASD. Focus groups were conducted to elicit participant perspectives on app design and functionalities to inform further app development. Methods The app, called FMF Connect, was derived from the scientifically validated Families Moving Forward (FMF) Program, a clinician-delivered behavioral consultation intervention. FMF Connect was intended for caregiver self-delivery and included five main components: (1) Learning Modules, (2) Family Forum, (3) Library, (4) Notebook, and (5) Dashboard. Focus group methods were used to solicit perspectives from diverse families during the early stages of app development. Questions were asked about interface design, relevance of components and content, and perceived barriers and facilitators of use. A total of 25 caregivers participated in 7 focus groups across 5 US cities. Data were analyzed thematically. Results Focus group participants were generally enthusiastic about the app interface design and components. Four global positive impression themes emerged, including (1) ease of access, (2) how the app guides and organizes information, (3) connection to other users and information, and (4) ability to share some content with others. Themes arose not only in discussions relating to positive app features but also when participants were asked about motivators for app use. Participants related how these positive global themes could address some system-level barriers, such as limited access to services, feeling isolated, and increased advocacy needs related to the societal lack of FASD knowledge. Participants identified many positive features about individual app components and functionalities. They also communicated potential barriers to use and raised important concerns and considerations relating to several app components. These included recognizability of the app based on the logo, and the balance of following the planned intervention sequence versus obtaining immediate answers. Also mentioned were privacy and dynamics within the Family Forum. Conclusions FMF Connect is a promising novel intervention with potential to reach many families in need and reduce significant barriers to care, resulting in a broader public health impact. Study findings will guide further app development both in terms of content and technological advances to optimize intervention effects. FMF Connect app development provides useful directions for other apps aimed at changing parenting practices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gwynette, McLeod Frampton, Danielle Morriss, Nancy Warren, James Truelove, Jennifer Warthen, Charles Paul Ross, George Mood, Charlotte Anne Snook und Jeffrey Borckardt. „Social Skills Training for Adolescents With Autism Spectrum Disorder Using Facebook (Project Rex Connect): A Survey Study“. JMIR Mental Health 4, Nr. 1 (23.01.2017): e4. http://dx.doi.org/10.2196/mental.6605.

Der volle Inhalt der Quelle
Annotation:
Background Adolescents with autism spectrum disorder (ASD) spend more time using electronic screen media than neurotypical peers; preliminary evidence suggests that computer-assisted or Web-based interventions may be beneficial for social skills acquisition. The current generation of adolescents accesses the Internet through computers or phones almost daily, and Facebook is the most frequently used social media platform among teenagers. This is the first research study to explore the use of Facebook as a therapeutic tool for adolescents with ASD. Objective To study the feasibility and clinical impact of using a Web-based social platform in combination with social skills training for adolescents with ASD. Methods This pilot study enrolled 6 participants (all males; mean age 14.1 years) in an online social skills training group using Facebook. Data was collected on the participants’ social and behavioral functioning at the start and conclusion of the intervention. Outcome measures included the Social Responsiveness Scale-2, the Social Skills Improvement System Rating Scale, and the Project Rex Parent Survey. Participants were surveyed at the conclusion of the intervention regarding their experience. Results No statistically significant differences in measurable outcomes were observed. However, the online addition of Facebook was well received by participants and their parents. The Facebook intervention was able to be executed with a careful privacy protocol in place and at minimal safety risk to participants. Conclusions The utilization of Facebook to facilitate delivery of social skills training for adolescents with ASD appears to be feasible, although the clinical impact of such an addition is still unclear. It is important to note that social difficulties of participants persisted with the addition of the online platform and participants still required assistance to engage with peers in an online environment. A Web-based intervention such as the one utilized in this study has the potential to reach a mass number of patients with ASD and could address disparities in access to in-person treatment services. However, the complexity and evolving nature of Facebook’s website and privacy settings leads to a number of unique online safety concerns that may limit its clinical utility. Issues encountered in our study support the development of an alternative and closed Web-based social platform designed specifically for the target audience with ASD; this platform could be a safer and more easily moderated setting for aiding in social skills development. Despite a small sample size with no statistically significant improvements of target symptoms, the use of electronic screen media as a therapeutic tool for adolescents with ASD is still a promising area of research warranting further investigation. Our study helps inform future obstacles regarding feasibility and safety.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Krim, Mohamed, Adda Ali-Pacha und Naima Hadj-Said. „New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission“. Indonesian Journal of Electrical Engineering and Computer Science 5, Nr. 1 (01.01.2017): 166. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp166-180.

Der volle Inhalt der Quelle
Annotation:
<p>While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.</p>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Chivilgina, Olga, Tenzin Wangmo, Bernice Simone Elger, Thomas Heinrich und Fabrice Jotterand. „mHealth for schizophrenia spectrum disorders management: A systematic review“. International Journal of Social Psychiatry 66, Nr. 7 (23.06.2020): 642–65. http://dx.doi.org/10.1177/0020764020933287.

Der volle Inhalt der Quelle
Annotation:
Background: Various types of computational technologies can be used to access, store and wirelessly share private and sensitive user-related information. The ‘big data’ provided by these technologies may enable researchers and clinicians to better identify behavioral patterns and to provide a more personalized approach to care. The information collected, however, can be misused or potentially abused, and therefore could be detrimental to the very people who provided their medical data with the hope of improving care. This article focuses on the use of emerging mobile technologies that allow the collection of data about patients experiencing schizophrenia spectrum and related disorders. Schizophrenia has been recognized by the Sustainable Development Goals of the United Nations for its burden on our health care system and society [1]. Our analysis provides an overview of the range of available mobile technologies for people with schizophrenia and related conditions along with the technology’s reported capabilities and limitations, and efficacy of mHealth interventions based on the data from articles. Thus, the focus of this review is first and foremost to update the scope of existing technologies as previous systematic reviews such as the ones by Alvarez-Jimenez et al. and by Firth and Torous are outdated [2, 3]. Although we also examine the ethical issues arising from the use of these technologies, for an in-depth analysis of the ethical implications of mobile Health technologies (mHealth), we refer the readers to our follow-up article. In terms of the ubiquitous availability of technology on the internet, our article summarizes significant information for mental health specialists and apprises the reader about the existence of these technologies. Objectives: In terms of the ubiquitous availability of technology on the internet, our article summarizes significant information for mental health specialists and apprises the reader about the existence of these technologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Hashim, Norlezah, Fakrulradzi Idris, Tuan Nur Anisa Tuan Ab Aziz, Siti Halma Johari, Rozilawati Mohd Nor und Norfariza Ab Wahab. „Location tracking using LoRa“. International Journal of Electrical and Computer Engineering (IJECE) 11, Nr. 4 (01.08.2021): 3123. http://dx.doi.org/10.11591/ijece.v11i4.pp3123-3128.

Der volle Inhalt der Quelle
Annotation:
<span>Local area network (LAN) as Bluetooth, WiFi and ZigBee are well established technology. The biggest problem with many LAN is the battery consumption and short ranges link budgets. LoRa is a new, private, unlicensed and spread spectrum modulation technique which allows sending low rates at extremely long ranges with minimal power consumption. More importantly, there is no access fee associated with this type of wireless technology. The main idea behind this work is to conduct performance and capability analysis of a currently available LoRa transceiver. We develop a location monitoring system using LoRa and global positioning system (GPS) module and we analyze the detectable range of its data, its battery consumption as well as received signal strength indicator (RSSI). Our deployment experiment demonstrates that the sy<span>stem is able to detect the transmitted data within 290 meters of distances. Using 6 volts of battery AA, the transmission of data still occurred after 24 hours</span>. <span>This project is emphasized a location monitoring system that provide low power usage</span> but long range.</span>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Ardagna, C. A., M. Cremonini, S. De Capitani di Vimercati und P. Samarati. „A privacy-aware access control system“. Journal of Computer Security 16, Nr. 4 (16.07.2008): 369–97. http://dx.doi.org/10.3233/jcs-2008-0328.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Shafeeq, Sehrish, Masoom Alam und Abid Khan. „Privacy aware decentralized access control system“. Future Generation Computer Systems 101 (Dezember 2019): 420–33. http://dx.doi.org/10.1016/j.future.2019.06.025.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Salama, Ahmed M., Ming Li, Loukas Lazos, Yong Xiao und Marwan Krunz. „Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access“. IEEE Transactions on Cognitive Communications and Networking 5, Nr. 3 (September 2019): 611–24. http://dx.doi.org/10.1109/tccn.2019.2919731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Li, Xiaohui, Qi Zhu und Xianbin Wang. „Privacy-Aware Crowdsourced Spectrum Sensing and Multi-User Sharing Mechanism in Dynamic Spectrum Access Networks“. IEEE Access 7 (2019): 32971–88. http://dx.doi.org/10.1109/access.2019.2901200.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Wang, Xiaoyan, Masahiro Umehira, Biao Han, Hao Zhou, Peng Li und Celimuge Wu. „An Efficient Privacy Preserving Spectrum Sharing Framework for Internet of Things“. IEEE Access 8 (2020): 34675–85. http://dx.doi.org/10.1109/access.2020.2974227.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Lai, Huibin, Li Xu und Yali Zeng. „An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing“. IEEE Access 8 (2020): 163472–82. http://dx.doi.org/10.1109/access.2020.3021583.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Troja, Erald, Nikhil Yadav, Ice Lin und Nhie U. Diep. „Privacy-Preserving Crowd-Sensing for Dynamic Spectrum Access With Malicious Workers“. IEEE Access 9 (2021): 24234–48. http://dx.doi.org/10.1109/access.2021.3057322.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Naher, Nahitun, Dina Balabanova, Eleanor Hutchinson, Robert Marten, Roksana Hoque, Samiun Nazrin Bente Kamal Tune, Bushra Zarin Islam und Syed Masud Ahmed. „Do social accountability approaches work? A review of the literature from selected low- and middle-income countries in the WHO South-East Asia region“. Health Policy and Planning 35, Supplement_1 (01.11.2020): i76—i96. http://dx.doi.org/10.1093/heapol/czaa107.

Der volle Inhalt der Quelle
Annotation:
Abstract Governance failures undermine efforts to achieve universal health coverage and improve health in low- and middle-income countries by decreasing efficiency and equity. Punitive measures to improve governance are largely ineffective. Social accountability strategies are perceived to enhance transparency and accountability through bottom-up approaches, but their effectiveness has not been explored comprehensively in the health systems of low- and middle-income countries in south and Southeast Asia where these strategies have been promoted. We conducted a narrative literature review to explore innovative social accountability approaches in Bangladesh, Bhutan, India, Indonesia, the Maldives, Myanmar and Nepal spanning the period 2007–August 2017, searching PubMed, Scopus and Google Scholar. To augment this, we also performed additional PubMed and Google Scholar searches (September 2017–December 2019) to identify recent papers, resulting in 38 documents (24 peer-reviewed articles and 14 grey sources), which we reviewed. Findings were analysed using framework analysis and categorized into three major themes: transparency/governance (eight), accountability (11) and community participation (five) papers. The majority of the reviewed approaches were implemented in Bangladesh, India and Nepal. The interventions differed on context (geographical to social), range (boarder reform to specific approaches), actors (public to private) and levels (community-specific to system level). The initiatives were associated with a variety of positive outcomes (e.g. improved monitoring, resource mobilization, service provision plus as a bridge between the engaged community and the health system), yet the evidence is inconclusive as to the extent that these influence health outcomes and access to health care. The review shows that there is no common blueprint which makes accountability mechanisms viable and effective; the effectiveness of these initiatives depended largely on context, capacity, information, spectrum of actor involvement, independence from power agendas and leadership. Major challenges that undermined effective implementation include lack of capacity, poor commitment and design and insufficient community participation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Chavhan, Suresh, Deepak Gupta, Sahil Garg, Ashish Khanna, Bong Jun Choi und M. Shamim Hossain. „Privacy and Security Management in Intelligent Transportation System“. IEEE Access 8 (2020): 148677–88. http://dx.doi.org/10.1109/access.2020.3015096.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Yao, Jing, Yifeng Zheng, Yu Guo, Chengjun Cai, Anxin Zhou, Cong Wang und Xiaolin Gui. „A Privacy-Preserving System for Targeted Coupon Service“. IEEE Access 7 (2019): 120817–30. http://dx.doi.org/10.1109/access.2019.2937669.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ming, Yang, und Tingting Zhang. „Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System“. Sensors 18, Nr. 10 (18.10.2018): 3520. http://dx.doi.org/10.3390/s18103520.

Der volle Inhalt der Quelle
Annotation:
The sharing of electronic health records (EHR) in cloud servers is an increasingly important development that can improve the efficiency of medical systems. However, there are several concerns focusing on the issues of security and privacy in EHR system. The EHR data contains the EHR owner’s sensitive personal information, if these data are obtained by a malicious user, it will not only cause the leakage of patient’s privacy, but also affect the doctor’s diagnosis. It is a very challenging problem for the EHR owner fully controls over own EHR data as well as preserves the privacy of himself. In this paper, we propose a new privacy-preserving access control (PPAC) scheme for EHR. To achieve fine-grained access control of the EHR data, we utilize the attribute-based signcryption (ABSC) mechanism to signcrypt data based on the access policy for the linear secret sharing schemes. Employing the cuckoo filter to hide the access policy, it could protect the EHR owner’s privacy information. In addition, the security analysis shows that the proposed scheme is provably secure under the decisional bilinear Diffie-Hellman exponent assumption and the computational Diffie-Hellman exponent assumption in the standard model. Furthermore, the performance analysis indicates that the proposed scheme achieves low costs of communication and computation compared with the related schemes, meanwhile preserves the EHR owner’s privacy. Therefore, the proposed scheme is better suited to EHR system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Abd Razak, Shukor, Nur Hafizah Mohd Nazari und Arafat Al-Dhaqm. „Data Anonymization Using Pseudonym System to Preserve Data Privacy“. IEEE Access 8 (2020): 43256–64. http://dx.doi.org/10.1109/access.2020.2977117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Zhu, Yong, Chao Huang, Zhihui Hu, Abdullah Al-Dhelaan und Mohammed Al-Dhelaan. „Blockchain-Enabled Access Management System for Edge Computing“. Electronics 10, Nr. 9 (22.04.2021): 1000. http://dx.doi.org/10.3390/electronics10091000.

Der volle Inhalt der Quelle
Annotation:
In the post-cloud era, edge computing is a new computing paradigm with data processed at the edge of the network, which can process the data close to the end-user in real time and offload the cloud task intelligently. Meanwhile, the decentralization, tamper-proof and anonymity of blockchain technology can provide a new trusted computing environment for edge computing. However, it does raise considerable concerns of security, privacy, fault-tolerance and so on. For example, identity authentication and access control rely on third parties, heterogeneous devices and different vendors in IoT, leading to security and privacy risks, etc. How to combine the advantages of the two has become the highlight of academic research, especially the issue of secure resource management. Comprehensive security and privacy involve all aspects of platform, data, application and access control. In. this paper, the architecture and behavior of an Access Management System (AMS) in a proof of concept (PoC) prototype are proposed with a Color Petri Net (CPN) model. The two domains of blockchain and edge computing are organically connected by interfaces and interactions. The simulation of operation, activity and role association proves the feasibility and effectiveness of the AMS. The instances of platform business access control, data access control, database services, IOT hub service are run on Advantech WISE-PaaS through User Account and Authentication (UAA). Finally, fine-grained and distributed access control can be realized with the help of a blockchain attribute. Namely, smart contracts are used to register, broadcast, and revoke access authorization, as well as to create specific transactions to define access control policies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Zhou, Xingguang, Jianwei Liu, Zongyang Zhang und Qianhong Wu. „Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System“. Security and Communication Networks 2020 (10.02.2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.

Der volle Inhalt der Quelle
Annotation:
The application of cloud storage system has been deployed widely in recent years. A lot of electronic medical records (EMRs) are collected and uploaded to the cloud for scalable sharing among the authority users. It is necessary to guarantee the confidentiality of EMRs and the privacy of EMR owners. To achieve this target, we summarize a series of attack behaviors in the cloud storage system and present the security model against many types of unexpected privacy leakage. Privacy of unassailed EMRs is guaranteed in this model, and the influence of privacy leakage is controlled in a certain scope. We also propose a role-based access control scheme to achieve flexible access control on these private EMRs. One can access medical records only if his/her role satisfies the defined access policy, which implies a fine-grained access control. Theoretical and experimental analyses show the efficiency of our scheme in terms of computation and communication.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Ghanta, Jyothi, B. Tarakeswara und B. Sathyanarayana. „Optimized Privacy-Preserving Access Control System for Relational Incremental Data“. International Journal of Computer Applications 136, Nr. 7 (17.02.2016): 16–19. http://dx.doi.org/10.5120/ijca2016908491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Buccafurri, Francesco, Gianluca Lax, Serena Nicolazzo und Antonino Nocera. „A System for Privacy-Preserving Access Accountability in Critical Environments“. IEEE Pervasive Computing 18, Nr. 2 (01.04.2019): 58–66. http://dx.doi.org/10.1109/mprv.2018.2884125.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Liu, Shengchao, Jessie Hui Wang, Jilong Wang und Qianli Zhang. „Achieving User-Defined Location Privacy Preservation Using a P2P System“. IEEE Access 8 (2020): 45895–912. http://dx.doi.org/10.1109/access.2020.2978488.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

JAKŠIĆ, SVETLANA, JOVANKA PANTOVIĆ und SILVIA GHILEZAN. „Linked data privacy“. Mathematical Structures in Computer Science 27, Nr. 1 (18.03.2015): 33–53. http://dx.doi.org/10.1017/s096012951500002x.

Der volle Inhalt der Quelle
Annotation:
Web of Linked Data introduces common format and principles for publishing and linking data on the Web. Such a network of linked data is publicly available and easily consumable. This paper introduces a calculus for modelling networks of linked data with encoded privacy preferences.In that calculus, a network is a parallel composition of users, where each user is named and consists of data, representing the user's profile, and a process. Data is a parallel composition of triples with names (resources) as components. Associated with each name and each triple of names are their privacy protection policies, that are represented by queries. A data triple is accessible to a user if the user's data satisfies the query assigned to that triple.The main contribution of this model lies in the type system which together with the introduced query order ensures that static type-checking prevents privacy violations. We say that a network is well behaved if —access to a triple is more restrictive than access to its components and less restrictive than access to the user name it is enclosed with,—each user can completely access their own profile,—each user can update or partly delete profiles that they own (can access the whole profiles), and—each user can update the privacy preference policy of data of another profile that they own or write data to another profile only if the newly obtained profile stays fully accessible to their owner.We prove that any well-typed network is well behaved.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Liyanage, H., S. T. Liaw, C. T. Di Iorio, C. Kuziemsky, R. Schreiber, A. L. Terry und S. de Lusignan. „Building a Privacy, Ethics, and Data Access Framework for Real World Computerised Medical Record System Data: A Delphi Study“. Yearbook of Medical Informatics 25, Nr. 01 (August 2016): 138–45. http://dx.doi.org/10.15265/iy-2016-035.

Der volle Inhalt der Quelle
Annotation:
Summary Background: Privacy, ethics, and data access issues pose significant challenges to the timely delivery of health research. Whilst the fundamental drivers to ensure that data access is ethical and satisfies privacy requirements are similar, they are often dealt with in varying ways by different approval processes. Objective: To achieve a consensus across an international panel of health care and informatics professionals on an integrated set of privacy and ethics principles that could accelerate health data access in data-driven health research projects. Method: A three-round consensus development process was used. In round one, we developed a baseline framework for privacy, ethics, and data access based on a review of existing literature in the health, informatics, and policy domains. This was further developed using a two-round Delphi consensus building process involving 20 experts who were members of the International Medical Informatics Association (IMIA) and European Federation of Medical Informatics (EFMI) Primary Health Care Informatics Working Groups. To achieve consensus we required an extended Delphi process. Results: The first round involved feedback on and development of the baseline framework. This consisted of four components: (1) ethical principles, (2) ethical guidance questions, (3) privacy and data access principles, and (4) privacy and data access guidance questions. Round two developed consensus in key areas of the revised framework, allowing the building of a newly, more detailed and descriptive framework. In the final round panel experts expressed their opinions, either as agreements or disagreements, on the ethics and privacy statements of the framework finding some of the previous round disagreements to be surprising in view of established ethical principles. Conclusion: This study develops a framework for an integrated approach to ethics and privacy. Privacy breech risk should not be considered in isolation but instead balanced by potential ethical benefit.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Mandal, Ajaya, Prakriti Dumaru, Sagar Bhandari, Shreeti Shrestha und Subarna Shakya. „Decentralized Electronic Health Record System“. Journal of the Institute of Engineering 15, Nr. 1 (16.02.2020): 77–80. http://dx.doi.org/10.3126/jie.v15i1.27716.

Der volle Inhalt der Quelle
Annotation:
With a view to overcome the shortcomings of traditional Electronic Health Record (EHR) system so as to assure the interoperability by providing open access to sensitive health data, while still preserving personal data privacy, anonymity and avoiding data misuse, Decentralized Electronic Health Record System was developed. The aforementioned issue concerning traditional EHR system can be addressed by implication of emerging technology of the era namely Block chain, together with Inter Planetary File System (IPFS) which enables data sharing in decentralized and transactional fashion, thereby maintaining delicate balance between privacy and accessibility of electronic health records. A block chain based EHR system has been built for secure, efficient and interoperable access to medical records by both patients and doctors while preserving privacy of the sensitive patient’s information. Patients can easily and comprehensively access to their medical records across providers and treatment sites using unique properties of block chain and decentralized storage. A separate portal for both the patients and doctors has been built enabling the smart contracts to handle further interaction between doctors and patients. So, in this system, it is demonstrated how principles of decentralization and block chain architectures could contribute to EHR system using Ethereum smart contracts and IPFS to orchestrate a suitable system governing the medical record access while providing patients with comprehensive record review along with consideration for audit ability and data sharing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

He, Ying, Beeshanga Abewardana Jayawickrama, Eryk Dutkiewicz, Srikathyayani Srikanteswara und Markus Mueck. „Priority Access and General Authorized Access Interference Mitigation in the Spectrum Access System“. IEEE Transactions on Vehicular Technology 67, Nr. 6 (Juni 2018): 4969–83. http://dx.doi.org/10.1109/tvt.2018.2797970.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Kasperbauer, T. J. „Protecting health privacy even when privacy is lost“. Journal of Medical Ethics 46, Nr. 11 (05.12.2019): 768–72. http://dx.doi.org/10.1136/medethics-2019-105880.

Der volle Inhalt der Quelle
Annotation:
The standard approach to protecting privacy in healthcare aims to control access to personal information. We cannot regain control of information after it has been shared, so we must restrict access from the start. This ‘control’ conception of privacy conflicts with data-intensive initiatives like precision medicine and learning health systems, as they require patients to give up significant control of their information. Without adequate alternatives to the control-based approach, such data-intensive programmes appear to require a loss of privacy. This paper argues that the control view of privacy is shortsighted and overlooks important ways to protect health information even when widely shared. To prepare for a world where we no longer control our data, we must pursue three alternative strategies: obfuscate health data, penalise the misuse of health data and improve transparency around who shares our data and for what purposes. Prioritising these strategies is necessary when health data are widely shared both within and outside of the health system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Mavridis, Ioannis. „Deploying Privacy Improved RBAC in Web Information Systems“. International Journal of Information Technologies and Systems Approach 4, Nr. 2 (Juli 2011): 70–87. http://dx.doi.org/10.4018/jitsa.2011070105.

Der volle Inhalt der Quelle
Annotation:
Access control technology holds a central role in achieving trustworthy management of personally identifiable information in modern information systems. In this article, a privacy-sensitive model that extends Role-Based Access Control (RBAC) to provide privacy protection through fine-grained and just-in-time access control in Web information systems is proposed. Moreover, easy and effective mapping of corresponding components is recognized as an important factor for succeeding in matching security and privacy objectives. Such a process is proposed to be accomplished by capturing and modeling privacy requirements in the early stages of information system development. Therefore, a methodology for deploying the mechanisms of an access control system conforming to the proposed Privacy Improved Role-Based Access Control (PIRBAC) model is presented. To illustrate the application of the proposed methodology, an application example in the healthcare domain is described.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Wang, Jingwei, Xinchun Yin und Jianting Ning. „Fine-Grained Task Access Control System for Mobile Crowdsensing“. Security and Communication Networks 2021 (04.02.2021): 1–13. http://dx.doi.org/10.1155/2021/6682456.

Der volle Inhalt der Quelle
Annotation:
Mobile crowdsensing enables people to collect and process a massive amount of information by using social resources without any cost on sensor deployment or model training. Many schemes focusing on the problems of task assignment and privacy preservation have been proposed so far. However, the privacy-preserving of requesters and task access control, which are vital to mobile crowdsensing, is barely considered in the literature. To address the aforementioned issues, a fine-grained task access control system for mobile crowdsensing is proposed. In particular, the requester can decide the group of task performers who can access the task by utilizing attribute-based encryption technology. T he untrusted crowdsensing platform cannot obtain any sensitive information concerning the requester or the task, while the qualified task performers are capable of retrieving tasks within 0.85 ms. Security analysis and experimental results are presented to show the feasibility and efficiency of the proposed system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Wang, Gui Chao, Ai Li Zhang und Yong Zhen Li. „Secure Authentication Protocol of RFID System Based on Access Control“. Advanced Engineering Forum 6-7 (September 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.

Der volle Inhalt der Quelle
Annotation:
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Farouk, Fifi, Yasmin Alkady und Rawya Rizk. „Efficient Privacy-Preserving Scheme for Location Based Services in VANET System“. IEEE Access 8 (2020): 60101–16. http://dx.doi.org/10.1109/access.2020.2982636.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Chiou, Shin-Yan, und Tzun-Yuan Tu. „A Trusted Mobile Ride-Hailing Evaluation System With Privacy and Authentication“. IEEE Access 8 (2020): 61929–42. http://dx.doi.org/10.1109/access.2020.2983189.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Kim, Jong Wook, Kennedy Edemacu und Beakcheol Jang. „MPPDS: Multilevel Privacy-Preserving Data Sharing in a Collaborative eHealth System“. IEEE Access 7 (2019): 109910–23. http://dx.doi.org/10.1109/access.2019.2933542.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Badr, Mahmoud M., Wesam Al Amiri, Mostafa M. Fouda, Mohamed M. E. A. Mahmoud, Abdulah Jeza Aljohani und Waleed Alasmary. „Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain“. IEEE Access 8 (2020): 150823–43. http://dx.doi.org/10.1109/access.2020.3016945.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

She, Wei, Zhi-Hao Gu, Xu-Kang Lyu, Qi Liu, Zhao Tian und Wei Liu. „Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving“. IEEE Access 7 (2019): 62058–70. http://dx.doi.org/10.1109/access.2019.2916345.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Nabil, Mahmoud, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary und Maazen Alsabaan. „Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics“. IEEE Access 9 (2021): 79911–26. http://dx.doi.org/10.1109/access.2021.3082910.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

.JAN, S., A. RAUF, R. SAEED, N. M. FANCY, F. Q. KHAN, G. AHMAD und K. AZAM. „Monitoring and Controlling Access to Privacy Sensitive Resources of Android System“. SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 52, Nr. 1 (21.03.2020): 49–56. http://dx.doi.org/10.26692/surj/2020.03.08.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Wang, Xiang, Heyu Xue, Xuefeng Liu und Qingqi Pei. „A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication“. IEEE Access 7 (2019): 14186–97. http://dx.doi.org/10.1109/access.2019.2894535.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Zheng, Dong, Chunming Jing, Rui Guo, Shiyao Gao und Liang Wang. „A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs“. IEEE Access 7 (2019): 117716–26. http://dx.doi.org/10.1109/access.2019.2936575.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Santana, Juan Ramon, Luis Sanchez, Pablo Sotres, Jorge Lanza, Tomas Llorente und Luis Munoz. „A Privacy-Aware Crowd Management System for Smart Cities and Smart Buildings“. IEEE Access 8 (2020): 135394–405. http://dx.doi.org/10.1109/access.2020.3010609.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Al-Zubaidie, Mishall, Zhongwei Zhang und Ji Zhang. „PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System“. International Journal of Environmental Research and Public Health 16, Nr. 9 (27.04.2019): 1490. http://dx.doi.org/10.3390/ijerph16091490.

Der volle Inhalt der Quelle
Annotation:
Electronic health record (EHR) systems are extremely useful for managing patients' data and are widely disseminated in the health sector. The main problem with these systems is how to maintain the privacy of sensitive patient information. Due to not fully protecting the records from unauthorised users, EHR systems fail to provide privacy for protected health information. Weak security measures also allow authorised users to exceed their specific privileges to access medical records. Thus, some of the systems are not a trustworthy source and are undesirable for patients and healthcare providers. Therefore, an authorisation system that provides privacy when accessing patients' data is required to address these security issues. Specifically, security and privacy precautions should be raised for specific categories of users, doctor advisors, physician researchers, emergency doctors, and patients' relatives. Presently, these users can break into the electronic systems and even violate patients' privacy because of the privileges granted to them or the inadequate security and privacy mechanisms of these systems. To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. It provides a security solution to the privacy issues and the problem of safe-access decisions for patients' data in the EHR. The~results of theoretical and experimental security analysis prove that PAX provides security features in preserving the privacy of healthcare users and is safe against known attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Yang, Chao, Mei Wang, Lin Zheng und Chaochen Tang. „Dual Function System With Shared Spectrum Using FMCW“. IEEE Access 6 (2018): 79026–38. http://dx.doi.org/10.1109/access.2018.2842079.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie