Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain
- Bharat Bhushan,
- Marie Tcholakian,
- Karolina Gorna,
- Maryline Laurent,
- Hella Kaffel Ben Ayed,
- Montassar Naghmouchi
Electronic health records (EHRs) and medical data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy, and accountability. ...
- research-articleDecember 2022
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature
Journal of Network and Computer Applications (JNCA), Volume 208, Issue Chttps://doi.org/10.1016/j.jnca.2022.103517AbstractThis paper presents a privacy-preserving identity management system, referred to as Pima. The proposed system is built over a novel unlinkable malleable signature scheme, called UMS. Pima supports pseudonymity, as it is more in line ...
- ArticleDecember 2021
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts
AbstractNowadays, open standards for self-sovereign identity and access management enable portable solutions that are following the requirements of IoT systems. This paper proposes a blockchain-based identity and access management system for IoT – ...
-
- research-articleSeptember 2021
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT
ACM Computing Surveys (CSUR), Volume 54, Issue 7Article No.: 138, Pages 1–34https://doi.org/10.1145/3465170The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, ...
- research-articleJune 2021
Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services
Journal of Computer Science and Technology (JCST), Volume 36, Issue 3Pages 664–692https://doi.org/10.1007/s11390-021-9673-zAbstractThis paper presents a survey of technologies for personal data self-management interfacing with administrative and territorial public service providers. It classifies a selection of scientific technologies into four categories of solutions: ...
- research-articleJanuary 2021
Privacy-Preserving Publication of Time-Series Data in Smart Grid
The collection of fine-grained consumptions of users in the smart grid enables energy suppliers and grid operators to propose new services (e.g., consumption forecasts and demand-response protocols) allowing to improve the efficiency and reliability of ...
- research-articleJanuary 2021
An Efficient User-Centric Consent Management Design for Multiservices Platforms
This paper presents an efficient user-centric consent management system to access online services of the Territorial Collectivities and Public Administration (TCPA) as well as user-authorized third parties. It defines a novel PII manager that supports a ...
- research-articleApril 2020
Privacy preservation for social networks sequential publishing
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 170, Issue Chttps://doi.org/10.1016/j.comnet.2020.107106AbstractThe proliferation of social networks allowed creating a big quantity of data about users and their relationships. Such data contain much private information. Therefore, anonymization is required before publishing the data for data ...
- research-articleMarch 2020
Privacy preserving cooperative computation for personalized web search applications
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 250–258https://doi.org/10.1145/3341105.3373947With the emergence of connected objects and the development of Artificial Intelligence (AI) mechanisms and algorithms, personalized applications are gaining an expanding interest, providing services tailored to each single user needs and expectations. ...
- research-articleJanuary 2020
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
Journal of Parallel and Distributed Computing (JPDC), Volume 135, Issue CPages 1–20https://doi.org/10.1016/j.jpdc.2019.08.014AbstractIn this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents ...
- research-articleJanuary 2019
Authenticated and Privacy-Preserving Consent Management in the Internet of Things
Procedia Computer Science (PROCS), Volume 151, Issue CPages 256–263https://doi.org/10.1016/j.procs.2019.04.037AbstractAs the Internet of Things (IoT) starts providing meaningful solutions in multiple domains, users expect to take full advantage of the features and benefits of smart devices, but not at the cost of privacy loss. They want to keep control over their ...
- research-articleDecember 2018
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
M4IoT'18: Proceedings of the 5th Workshop on Middleware and Applications for the Internet of ThingsPages 35–40https://doi.org/10.1145/3286719.3286727The Internet of Things paradigm lacks end-to-end privacy solutions to consider its full adoption in real life scenarios in the near future. The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger ...
- research-articleNovember 2018
ICAuth: A secure and scalable owner delegated inter-cloud authorization
Future Generation Computer Systems (FGCS), Volume 88, Issue CPages 319–332https://doi.org/10.1016/j.future.2018.05.066AbstractThis paper proposes a secure inter-cloud authorization scheme using ciphertext-policy attribute-based encryption (CP-ABE). The proposed scheme enables data owners to access files which are stored in cloud storage servers, managed by a ...
Highlights- An inter-cloud authorization scheme is proposed for secure file sharing.
- Data ...
- research-articleJune 2018
Questioning the security and efficiency of the ESIoT approach
WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 202–207https://doi.org/10.1145/3212480.3212491ESIoT is a secure access control and authentication protocol introduced for Internet of Things (IoT) applications. The core primitive of ESIoT is an identity-based broadcast encryption scheme called Secure Identity-Based Broadcast Encryption (SIBBE). ...
- articleJanuary 2018
Securely outsourcing the ciphertext-policy attribute-based encryption
Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control ...
- research-articleJanuary 2017
Diet-ESP: IP layer security for IoT
Journal of Computer Security (JOCS), Volume 25, Issue 2Pages 173–203https://doi.org/10.3233/JCS-16857The number of devices connected through the Internet of Things (IoT) will significantly grow in the next few years while security of their interconnections is going to be a major challenge. For many devices in IoT scenarios, the necessary resources to ...