[go: up one dir, main page]

Bisdikian et al., 2014 - Google Patents

Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments

Bisdikian et al., 2014

Document ID
1841002670670781246
Author
Bisdikian C
Gibson C
Chakraborty S
Srivastava M
Sensoy M
Norman T
Publication year
Publication venue
Pervasive and Mobile Computing

External Links

Snippet

The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/16Service discovery or service management, e.g. service location protocol [SLP] or Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Haque et al. Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
Mohammadi et al. Trust-based recommendation systems in Internet of Things: a systematic literature review
Mubarakali An efficient authentication scheme using blockchain technology for wireless sensor networks
Chabridon et al. A survey on addressing privacy together with quality of context for context management in the Internet of Things
Bisdikian et al. Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments
Al-Khafajiy et al. Intelligent control and security of fog resources in healthcare systems via a cognitive fog model
WO2019083626A1 (en) Adaptive model for database security and processing
Wrona et al. ontext-aware security and secure context-awareness in ubiquitous computing environments
Gosman et al. Controlling and filtering users data in intelligent transportation system
Cheng et al. A survey of crowdsensing and privacy protection in digital city
Yavari Internet of Things data contextualisation for scalable information processing, security, and privacy
Abed et al. The principle Internet of Things (IoT) security techniques framework based on seven levels IoT’s reference model
Wu et al. Federated learning‐based private medical knowledge graph for epidemic surveillance in internet of things
Trivellato et al. A semantic security framework for systems of systems
Bisdikian et al. Trust and obfuscation principles for quality of information in emerging pervasive environments
Ranaweera et al. Realizing contact-less applications with multi-access edge computing
Sadique et al. Enhancing data privacy in the internet of things (IoT) using edge computing
Steuer et al. Challenges and design goals for an architecture of a privacy-preserving smart city lab
Tyagi et al. Internet of Things: Future Challenging issues and possible research directions
Ackermann et al. Privacy-aware publication of wi-fi sensor data for crowd monitoring and tourism analytics
Zerkouk et al. A user profile based access control model and architecture
de Matos et al. Context-aware security in the internet of things: a review
Rasheed et al. Preserving location‐query privacy in location‐based services: A review
Joshi et al. A robust and trusted framework for IoT networks
Zhang et al. Security and privacy for mobile healthcare networks