Jaafar et al., 2023 - Google Patents
Blockchain-based consent management for privacy persevering and transparency in intelligent surveillance systemsJaafar et al., 2023
- Document ID
- 4375092219644389836
- Author
- Jaafar F
- Amayed D
- Salhab W
- Bouani H
- Cheriet M
- Publication year
- Publication venue
- 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)
External Links
Snippet
Video cameras are becoming ubiquitous. They'd be interconnected within a larger pervasive infrastructure supported by artificial intelligence which helps ensure smart services relaying in real-time video analysis and image processing. However, such services and technologies …
- 238000013459 approach 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
- H04N7/147—Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gadekallu et al. | Blockchain for edge of things: Applications, opportunities, and challenges | |
US11677756B2 (en) | Risk adaptive protection | |
Atlam et al. | Internet of things forensics: A review | |
US10999296B2 (en) | Generating adaptive trust profiles using information derived from similarly situated organizations | |
US10999297B2 (en) | Using expected behavior of an entity when prepopulating an adaptive trust profile | |
US10623431B2 (en) | Discerning psychological state from correlated user behavior and contextual information | |
Dhar et al. | Advanced security model for multimedia data sharing in Internet of Things | |
US20210342441A1 (en) | Progressive Trigger Data and Detection Model | |
Tarekegn et al. | Big data: security issues, challenges and future scope | |
Porras et al. | Security in the internet of things-a systematic mapping study | |
Abduljabbar et al. | A survey of privacy solutions using blockchain for recommender systems: Current status, classification and open issues | |
Geng et al. | Did-efed: Facilitating federated learning as a service with decentralized identities | |
WO2022103686A1 (en) | Privacy-preserving computing on subject data used to develop artificial intelligence tools | |
Shafik et al. | Privacy issues in social Web of things | |
Schmitt et al. | Security and privacy in the era of big data | |
Shirvanian et al. | Internet of Things data management: A systematic literature review, vision, and future trends | |
Mishra et al. | Blockchain DrivenAccess control architecture for the internet of things | |
Sadique et al. | Enhancing data privacy in the Internet of Things (IoT) using edge computing | |
Khanpara et al. | Toward the internet of things forensics: A data analytics perspective | |
Jaafar et al. | Blockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems | |
Pandey et al. | Legal/regulatory issues for MMBD in IoT | |
Luqman et al. | An overview of security issues in fog computing | |
López et al. | Live digital, remember digital: State of the art and research challenges | |
Gupta et al. | Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies | |
Kishor et al. | SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics |