The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problems of privacy protection and the user revokes in social network, a multi-authority attribute-based encryption access control for social network is presented. In the proposed scheme, we utilizes the linear secret sharing scheme and the proxy re-encryption technique to achieve the user rights update and support flexible access control strategy. Multiple authorities jointly...
Key revocation in mobile and tactical network environments remains a hard problem due to the required amount of connectivity and network bandwidth. Still, authenticity and integrity of messages are primary requirements in a tactical operation, so identity management must be offered in some form. Besides, tactical operations are organized as coalitions, where autonomous domains manage their services,...
In this paper we present a novel personalized location privacy protection solution based on AC-tree, we construct a Permission Access Control Center (PACC) in the wireless network, and each target in the wireless network have an AC-tree which store all the rules of user's location privacy. when a user request a target's location information, PACC determine the privacy level according to AC-tree of...
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that only users who can satisfy the associate security policy can derive the key to access the...
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs) in wireless applications. Current approaches rely mostly on the use of privacy policies to describe and solve this problem in an ad hoc way. In this paper, we propose a method based on the three-dimensional access control model to support privacy requirements. We show...
RFID is a convenient and efficient mechanism used for identification or authentication in industry, agriculture, commerce, health care, entrance control, etc. Most of the RFID systems need security mechanisms for authentication and privacy protection. In 2004, Gao et al. propose a RFID system for supply chain, their system has drawbacks on security. Recently, Chen et al. proposed an improvement to...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An anonymous biometric access control (ABAC) system is proposed to verify the membership status of a user using biometric signals without knowing his or her true identity. This system is useful in protecting the privacy of authorized users while keeping out potential imposters and attackers...
The trade-off between privacy and security was a subject of intensive discussion. Giving up privacy does not necessarily result in greater security, and greater security does not necessarily require a loss of privacy. In this work, three different novel approaches are presented to store personal data obtained from intelligent video surveillance systems in an efficient and secure way. The storage process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.