[go: up one dir, main page]

Jaafar et al., 2023 - Google Patents

Blockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems

Jaafar et al., 2023

Document ID
4375092219644389836
Author
Jaafar F
Amayed D
Salhab W
Bouani H
Cheriet M
Publication year
Publication venue
2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)

External Links

Snippet

Video cameras are becoming ubiquitous. They'd be interconnected within a larger pervasive infrastructure supported by artificial intelligence which helps ensure smart services relaying in real-time video analysis and image processing. However, such services and technologies …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Gadekallu et al. Blockchain for edge of things: Applications, opportunities, and challenges
US11677756B2 (en) Risk adaptive protection
Atlam et al. Internet of things forensics: A review
US10999296B2 (en) Generating adaptive trust profiles using information derived from similarly situated organizations
US10999297B2 (en) Using expected behavior of an entity when prepopulating an adaptive trust profile
US10623431B2 (en) Discerning psychological state from correlated user behavior and contextual information
Dhar et al. Advanced security model for multimedia data sharing in Internet of Things
US20210342441A1 (en) Progressive Trigger Data and Detection Model
Tarekegn et al. Big data: security issues, challenges and future scope
Porras et al. Security in the internet of things-a systematic mapping study
Abduljabbar et al. A survey of privacy solutions using blockchain for recommender systems: Current status, classification and open issues
Geng et al. Did-efed: Facilitating federated learning as a service with decentralized identities
WO2022103686A1 (en) Privacy-preserving computing on subject data used to develop artificial intelligence tools
Shafik et al. Privacy issues in social Web of things
Schmitt et al. Security and privacy in the era of big data
Shirvanian et al. Internet of Things data management: A systematic literature review, vision, and future trends
Mishra et al. Blockchain DrivenAccess control architecture for the internet of things
Sadique et al. Enhancing data privacy in the Internet of Things (IoT) using edge computing
Khanpara et al. Toward the internet of things forensics: A data analytics perspective
Jaafar et al. Blockchain-based consent management for privacy persevering and transparency in intelligent surveillance systems
Pandey et al. Legal/regulatory issues for MMBD in IoT
Luqman et al. An overview of security issues in fog computing
López et al. Live digital, remember digital: State of the art and research challenges
Gupta et al. Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies
Kishor et al. SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics