Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Eduardo Solana"'
Publikováno v:
11th International Conference on Network and System Security, NSS 2017, Proceedings pp. 737-752
Network and System Security ISBN: 9783319647005
11th International Conference on Network and System Security, NSS 2017, Proceedings
Network and System Security ISBN: 9783319647005
11th International Conference on Network and System Security, NSS 2017, Proceedings
The present paper establishes foundations for implementing Privacy and Security by Design in the scope of the Internet of Things (IoT) by using a new paradigm namely the Privacy Verification Chains (PVC). PVCs will act as a “privacy ledgers” allo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2c11762454dd7bd56c3ff088ef29dd39
https://archive-ouverte.unige.ch/unige:135652
https://archive-ouverte.unige.ch/unige:135652
Publikováno v:
PST
We present PISCES (Privacy Incorporated and SeCurity Enhanced Systems) framework, which aims at establishing foundations for implementing Privacy and Security by Design (PSD) in the scope of the Internet of Things (IoT). PISCES operates a strict sepa
Publikováno v:
International Conference on Networked Systems (NetSys 2017) pp. 1-8
International Conference on Networked Systems (NetSys 2017)
International Conference on Networked Systems (NetSys 2017)
Named Data Networks provide a clean-slate redesign of the Future Internet for efficient content distribution. Because Internet of Things are expected to compose a significant part of Future Internet, most content will be managed by constrained device
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d67621c00f7dd162a9906b2d6fbdd932
http://arxiv.org/abs/1609.02532
http://arxiv.org/abs/1609.02532
Publikováno v:
Internet of Things. IoT Infrastructures ISBN: 9783319470627
IoT 360 (1)
IoT 360 (1)
The distributed nature of Wireless Sensor Networks leads to the use of cloud databases that need to be protected when dealing with sensitive content. In this context, Searchable Symmetric Encryption provides the appropriate framework to perform secur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c8ad6617fbaaf0168063ea7ed6b0b5ae
https://doi.org/10.1007/978-3-319-47063-4_4
https://doi.org/10.1007/978-3-319-47063-4_4
Autor:
Eduardo Solana, Jurgen Harms
Publikováno v:
Security Protocols ISBN: 9783540640400
Security Protocols Workshop
Security Protocols Workshop
The absence of manageable global key distribution schemes is seriously hindering the deployment of basic security services in the Internet. The emergence of cryptosystems based on public key technology has represented a significant improvement in thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1fb57b1255c9a041e0ddb7356ea75309
https://doi.org/10.1007/bfb0028158
https://doi.org/10.1007/bfb0028158
Autor:
Vito Baggiolini, Mira Ramluckun, Jurgens Harms, Stephane Spahni, Jean-Francois Paccini, Eduardo Solana
Publikováno v:
Integrated Network Management IV ISBN: 9781475755176
Integrated Network Management
Integrated Network Management
The “Distributed Management Tree” (DMT) is a hierarchical structure designed for the management of distributed systems. The DMT has the form of an inverted tree, with nodes representing small active units for processing elements of management inf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb1b422a4d4d4dd32857291e352bdffa
https://doi.org/10.1007/978-0-387-34890-2_68
https://doi.org/10.1007/978-0-387-34890-2_68
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.