Bisdikian et al., 2014 - Google Patents
Inference management, trust and obfuscation principles for quality of information in emerging pervasive environmentsBisdikian et al., 2014
- Document ID
- 1841002670670781246
- Author
- Bisdikian C
- Gibson C
- Chakraborty S
- Srivastava M
- Sensoy M
- Norman T
- Publication year
- Publication venue
- Pervasive and Mobile Computing
External Links
Snippet
The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and …
- 230000000694 effects 0 abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/16—Service discovery or service management, e.g. service location protocol [SLP] or Web services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Haque et al. | Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends | |
| Mohammadi et al. | Trust-based recommendation systems in Internet of Things: a systematic literature review | |
| Mubarakali | An efficient authentication scheme using blockchain technology for wireless sensor networks | |
| Chabridon et al. | A survey on addressing privacy together with quality of context for context management in the Internet of Things | |
| Bisdikian et al. | Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments | |
| Al-Khafajiy et al. | Intelligent control and security of fog resources in healthcare systems via a cognitive fog model | |
| WO2019083626A1 (en) | Adaptive model for database security and processing | |
| Wrona et al. | ontext-aware security and secure context-awareness in ubiquitous computing environments | |
| Gosman et al. | Controlling and filtering users data in intelligent transportation system | |
| Cheng et al. | A survey of crowdsensing and privacy protection in digital city | |
| Yavari | Internet of Things data contextualisation for scalable information processing, security, and privacy | |
| Abed et al. | The principle Internet of Things (IoT) security techniques framework based on seven levels IoT’s reference model | |
| Wu et al. | Federated learning‐based private medical knowledge graph for epidemic surveillance in internet of things | |
| Trivellato et al. | A semantic security framework for systems of systems | |
| Bisdikian et al. | Trust and obfuscation principles for quality of information in emerging pervasive environments | |
| Ranaweera et al. | Realizing contact-less applications with multi-access edge computing | |
| Sadique et al. | Enhancing data privacy in the internet of things (IoT) using edge computing | |
| Steuer et al. | Challenges and design goals for an architecture of a privacy-preserving smart city lab | |
| Tyagi et al. | Internet of Things: Future Challenging issues and possible research directions | |
| Ackermann et al. | Privacy-aware publication of wi-fi sensor data for crowd monitoring and tourism analytics | |
| Zerkouk et al. | A user profile based access control model and architecture | |
| de Matos et al. | Context-aware security in the internet of things: a review | |
| Rasheed et al. | Preserving location‐query privacy in location‐based services: A review | |
| Joshi et al. | A robust and trusted framework for IoT networks | |
| Zhang et al. | Security and privacy for mobile healthcare networks |