loading
DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks
2009 Edition, April 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.
A description is not available for this item.
Distributed Privacy-Preserving Access Control in Sensor Networks
2012 Edition, Volume 23, August 1, 2012 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users...

Token Based Privacy Preserving Access Control in Wireless Sensor Networks
2015 Edition, September 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In large scale Wireless Sensor Network the network owner and the users of the sensor network may be different. A distributed access control module allows the users to access data from the network for which the user has...

Distributed privacy-preserving access control in a single-owner multi-user sensor network
2011 Edition, April 1, 2011 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

A distributed access control module in wireless sensor networks (WSNs) allows the network to authorize and grant user access privileges for in-network data access. Prior research mainly focuses on designing such...

A Fined-Grained Privacy-Preserving Access Control Protocol in Wireless Sensor Networks
2016 Edition, December 1, 2016 - Association for Computing Machinery (ACM)

For single-owner multi-user wireless sensor networks, there is the demand to implement the user privacy-preserving access control protocol in WSNs. Firstly, we propose a new access control protocol based on an efficient attribute-based...

Privacy-Preserving Access to Big Data in the Cloud
2016 Edition, Volume 3, September 1, 2016 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cloud storage can simplify data management and reduce data maintenance costs. However, many users and companies hesitate to move their data to cloud storage because of security and privacy concerns about third-party cloud service providers. Oblivious RAM (ORAM) aims to enable...

A privacy-preserving access control in outsourced storage services
2011 Edition, Volume 3, June 1, 2011 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In Storage-as-a-Services application,data owner delegates access control enforcement to external storage service privider while storing his data at it so as to free him from much involvement in users' query process. But the delegation of access control...

Privacy Preserving Access Control in Service-Oriented Architecture
2016 Edition, June 1, 2016 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Service-oriented Architecture (SOA) comprises a number of loosely-coupled independent services, which collaborate, interact and share data to accomplish incoming requests. A service invocation can involve multiple services, where each service accesses, processes and shares the client's data....

EP2AC: An Efficient Privacy-Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks
2014 Edition, August 1, 2014 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Data-oriented wireless sensor networks (WSNs) are expected to support the diverse infrastructure-based commercial and military services, including real-time traffic monitoring, ecosystem and battlefield surveillance. The success of data oriented WSNs depends on the underlying...

Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems
2011 Edition, November 1, 2011 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper proposes a framework for privacy preserving access control policies and mechanisms, and describes algorithms for access policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The...

Advertisement