View this topic in
Confidentiality is an ethical principle associated with several professions (e.g. , medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties. (

Conferences related to Confidentiality

Back to Top

2019 IEEE 17th International Conference on Industrial Informatics (INDIN)

Industrial information technologies

2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.

2019 IEEE Photonics Society Summer Topical Meeting Series (SUM)

The Topical Meetings of the IEEE Photonics Society are the premier conference series for exciting, new areas in photonic science, technology, and applications; creating the opportunity to learn about emerging fields and to interact with the research and technology leaders in an intimate environment.

2019 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more

GLOBECOM 2019 - 2019 IEEE Global Communications Conference

Provides a full program of technical and professional activities spanning hot topics in voice, data, image and multimedia communications and networking.

More Conferences

Periodicals related to Confidentiality

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...

Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...

Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...

Electromagnetic Compatibility, IEEE Transactions on

EMC standards; measurement technology; undesired sources; cable/grounding; filters/shielding; equipment EMC; systems EMC; antennas and propagation; spectrum utilization; electromagnetic pulses; lightning; radiation hazards; and Walsh functions

Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.

More Periodicals

Most published Xplore authors for Confidentiality

Back to Top

Xplore Articles related to Confidentiality

Back to Top

The Research and Design of 3G Terminal Data Confidentiality Services

[{u'author_order': 1, u'authorUrl': u'', u'full_name': u'Fangzhou Zhang', u'id': 37310691800}, {u'author_order': 2, u'authorUrl': u'', u'full_name': u'Xiaoge Dong', u'id': 38195778200}, {u'author_order': 3, u'authorUrl': u'', u'full_name': u'Dan Wang', u'id': 38189769700}, {u'author_order': 4, u'authorUrl': u'', u'full_name': u'Xibao Ma', u'id': 38195325200}, {u'author_order': 5, u'authorUrl': u'', u'full_name': u'Chen Chen', u'id': 37539294700}] 2010 International Conference on E-Business and E-Government, 2010

3GPP does not supply any active security service interface or available security algorithm model for the terminals, which restricts the initiative ability and configuration ability of security communication on the application layer in a great deal. Focusing on this problem, we firstly brought forward three-layer architecture which guarantees application layer's communication security of 3G terminals, researched secure confidentiality service model ...

Tuning On-Air Signatures for Balancing Performance and Confidentiality

[{u'author_order': 1, u'affiliation': u'Singapore Management University, Singapore', u'authorUrl': u'', u'full_name': u'Baihua Zheng', u'id': 37272833500}, {u'author_order': 2, u'affiliation': u'Pennsylvania State University, University Park', u'authorUrl': u'', u'full_name': u'Wang-Chien Lee', u'id': 37278521800}, {u'author_order': 3, u'affiliation': u'Pennsylvania State University, University Park', u'authorUrl': u'', u'full_name': u'Peng Liu', u'id': 37276301800}, {u'author_order': 4, u'affiliation': u'Hong Kong University of Science and Technology, Hong Kong', u'authorUrl': u'', u'full_name': u'Dik Lun Lee', u'id': 37280605800}, {u'author_order': 5, u'affiliation': u'Singapore Management University, Singapore', u'authorUrl': u'', u'full_name': u'Xuhua Ding', u'id': 37287407500}] IEEE Transactions on Knowledge and Data Engineering, 2009

In this paper, we investigate the trade off between performance and confidentiality in signature-based air indexing schemes for wireless data broadcast. Two metrics, namely, false drop probability and false guess probability, are defined to quantify the filtering efficiency and confidentiality loss of a signature scheme. Our analysis reveals that false drop probability and false guess probability share a similar trend ...

Enhancing Optical-CDMA Confidentiality With Multicode-Keying Encryption

[{u'author_order': 1, u'affiliation': u'Department of Electrical Engineering and the Graduate Institute of Communication Engineering, National Chung Hsing University, Taichung, Taiwan', u'authorUrl': u'', u'full_name': u'Wen-Hao Chang', u'id': 37085535605}, {u'author_order': 2, u'affiliation': u'Department of Electrical Engineering and the Graduate Institute of Communication Engineering, National Chung Hsing University, Taichung, Taiwan', u'authorUrl': u'', u'full_name': u'Guu-Chang Yang', u'id': 37276271000}, {u'author_order': 3, u'affiliation': u'Department of Electrical Engineering, National United University, Miaoli, Taiwan', u'authorUrl': u'', u'full_name': u'Cheng-Yuan Chang', u'id': 37276902100}, {u'author_order': 4, u'affiliation': u'Department of Engineering, Hofstra University, Hempstead, NY, USA', u'authorUrl': u'', u'full_name': u'Wing C. Kwong', u'id': 37269275300}] Journal of Lightwave Technology, 2015

Optical codes with large cardinality and tree structures of multiple subsets of codewords for adjustable code performance and cardinality have recently been proposed. As studied in this paper, these characteristics support multicode-keying encryption for enhancing physical-layer confidentiality in optical code-division multiple-access systems and networks. The concept of the multicode-keying encryption technique is introduced. The associated all- optical hardware is designed ...

Study on several confidentiality protection technologies for electronic document

[{u'author_order': 1, u'affiliation': u'Department of E-commerce and Economics, Sichuan TOP IT Vocational Institute, Chengdu, China', u'authorUrl': u'', u'full_name': u'Jian-Jun Zhou', u'id': 37086650056}] Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), 2013

As a usual information media in organizations, electronic document often relates to important information that should be kept confidential. The no- authorized access, unauthorized use and uncontrolled spread of electronic document will bring great loss to organizations. Therefore, ensuring the security of electronic document, preventing information from leaking and uncontrolled spreading are basic requirements of organizations' office affairs. Focusing on ...

Data confidentiality challenges in big data applications

[{u'author_order': 1, u'affiliation': u'Advanced Computing, Mathematics and Data Division, Pacific Northwest National Laboratory, Richland, WA', u'authorUrl': u'', u'full_name': u'Jian Yin', u'id': 37853397900}, {u'author_order': 2, u'affiliation': u'Advanced Computing, Mathematics and Data Division, Pacific Northwest National Laboratory, Richland, WA', u'authorUrl': u'', u'full_name': u'Dongfang Zhao', u'id': 37085517325}] 2015 IEEE International Conference on Big Data (Big Data), 2015

In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure ...

More Xplore Articles

Educational Resources on Confidentiality

Back to Top


No eLearning Articles are currently tagged "Confidentiality"


  • Security Basics for Computer Architects

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.

  • Information Theoretic Security

    Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. Attacks on the security of communication networks can be divided into two basic types: passive attacks and active attacks. An active attack corresponds to the situation in which a malicious actor intentionally disrupts the system. A passive attack corresponds to the situation in which a malicious actor attempts to interpret source information without injecting any information or trying to modify the information; i.e., passive attackers listen to the transmission without modifying it. Information Theoretic Security focuses on confidentiality issues, in which passive attacks are of primary concern. The information theoretic approach to achieving secure communication opens a promising new direction toward solving wireless networking security problems. Compared to contemporary cryptosystems, information theoretic approaches offer advantages such as eliminating the key management issue; are less vulnerable to the man-in-the-middle and achieve provable security that is robust to powerful eavesdroppers possessing unlimited computational resources, knowledge of the communication strategy employed including coding and decoding algorithms, and access to communication systems either through perfect or noisy channels. Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems. It proceeds to provide an overview of how information theoretic approaches are developed to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks. It is an invaluable resource for students and researchers working in network security, information theory and communications.

  • Capstone Design Courses: Producing Industry-Ready Biomedical Engineers

    The biomedical engineering senior capstone design course is probably the most important course taken by undergraduate biomedical engineering students. It provides them with the opportunity to apply what they have learned in previous years; develop their communication (written, oral, and graphical), interpersonal (teamwork, conflict management, and negotiation), project management, and design skills; and learn about the product development process. It also provides students with an understanding of the economic, financial, legal, and regulatory aspects of the design, development, and commercialization of medical technology. The capstone design experience can change the way engineering students think about technology, society, themselves, and the world around them. It gives them a short preview of what it will be like to work as an engineer. It can make them aware of their potential to make a positive contribution to health care throughout the world and generate excitement for and pride in the engineering profession. Working on teams helps students develop an appreciation for the many ways team members, with different educational, political, ethnic, social, cultural, and religious backgrounds, look at problems. They learn to value diversity and become more willing to listen to different opinions and perspectives. Finally, they learn to value the contributions of nontechnical members of multidisciplinary project teams. Ideas for how to organize, structure, and manage a senior capstone design course for biomedical and other engineering students are presented here. These ideas will be helpful to faculty who are creating a new design course, expanding a current design program to more than the senior year, or just looking for some ideas for improving an existing course. Contents: I. Purpose, Goals, and Benefits / Why Our Students Need a Senior Capstone Design Course / Desired Learning Outcomes / Changing Student Attitudes, Perceptions, and Awarenesss / Senior Capstone Design Courses and Accreditation Board for Engineering and Technology Outcomes / II. Designing a Course to Meet Student Needs / Course Management and Required Deliverables / Projects and Project Teams / Lecture Topics / Intellectual Property Confidentiality Issues in Design Projects / III. Enhancing the Capstone Design Experience / Industry Involvement in Capstone Design Courses / Developing Business and Entrepreneurial Literacy / Providing Students with a Clinical Perspective / Service Learning Opportunities / Collaboration with Industrial Design Students / National Student Design Competitions / Organizational Support for Senior Capstone Design Courses / IV. Meeting the Changing Needs of Future Engineers / Capstone Design Courses and the Engineer of 2020

  • Security

    This chapter discusses authentication protocols for network security. It also covers principles of key distribution, followed up by some specific solutions in ad hoc networks and sensor networks. Two‐party authentication protocols, and public key cryptography are used in many networks. With a public key cryptographic system, each party only has to know and verify the public key of the other party. Cryptographic authentication consists of challenging the user or communicating party being authenticated to prove its identity by demonstrating ability to encipher or decipher some item with a secret or private key known to be stored inside the smart card. Cryptography provides only two fundamental services, namely, confidentiality and authentication. Cryptography allows users to be identified by allocating secret keys to them. There are three components that make up security architecture: users, trusted users, and secure channels which may provide confidentiality, authentication, or both.

  • Routing in Wireless Sensor Networks

    The characteristics of a wireless sensor network (WSN) generally necessitate deployment of a number of sensor nodes to monitor an object, environment, or event. With the use of proper routing protocols, the life of a WSN can be extended much beyond the life of any of its individual nodes by putting the nodes in sleep mode when not in use and activating a single node at a time in a particular coverage area with multiple node deployment. Based on the network topology in which the WSN routing takes place, the routing protocol can be classified as flat, hierarchical, location based, or direct. Denial‐of‐service (DoS) attack is the most common threat in a WSN, wherein an attacking node can place itself in the sensor field. Secure routing protocols used in WSNs are some of the following: Security Protocols for Sensor Network (SPINS), and Authentication Confidentiality (AC).

  • Principles and Implementation Techniques of Software-Based Fault Isolation

    When protecting a computer system, it is often necessary to isolate an untrusted component into a separate protection domain and provide only controlled interaction between the domain and the rest of the system. Software-based Fault Isolation (SFI) establishes a logical protection domain by inserting dynamic checks before memory and control-transfer instructions. Compared to other isolation mechanisms, it enjoys the benefits of high efficiency (with less than 5% performance overhead), being readily applicable to legacy native code, and not relying on special hardware or OS support. SFI has been successfully applied in many applications, including isolating OS kernel extensions, isolating plug-ins in browsers, and isolating native libraries in the Java Virtual Machine. This monograph discusses the SFI policy, its main implementation and optimization techniques, as well as an SFI formalization on an idealized assembly language. It concludes with a brief discussion on future research directions and a look at other properties that provide strong integrity and confidentiality guarantees on software systems.

  • Ethics for Bioengineers

    Increasingly, biomedical scientists and engineers are involved in projects, design, or research and development that involve humans or animals. The book presents general concepts on professionalism and the regulation of the profession of engineering, including a discussion on what is ethics and moral conduct, ethical theories and the codes of ethics that are most relevant for engineers. An ethical decision-making process is suggested. Other issues such as conflicts of interest, plagiarism, intellectual property, confidentiality, privacy, fraud, and corruption are presented. General guidelines, the process for obtaining ethics approval from Ethics Review Boards, and the importance of obtaining informed consent from volunteers recruited for studies are presented. A discussion on research with animals is included. Ethical dilemmas focus on reproductive technologies, stem cells, cloning, genetic testing, and designer babies. The book includes a discussion on ethics and the technologies of body enhancement and of regeneration. The importance of assessing the impact of technology on people, society, and on our planet is stressed. Particular attention is given to nanotechnologies, the environment, and issues that pertain to developing countries. Ideas on gender, culture, and ethics focus on how research and access to medical services have, at times, been discriminatory towards women. The cultural aspects focus on organ transplantation in Japan, and a case study of an Aboriginal child in Canada; both examples show the impact that culture can have on how care is provided or accepted. The final section of the book discusses data collection and analysis and offers a guideline for honest reporting of results, avoiding fraud, or unethical approaches. The appendix presents a few case studies where fraud and/or unethical research have occurred. Table of Contents: Introduction to Ethics / Experiments with Human Subjects or Animals / Examples of Ethical Dilemmas in Biomedical Research / Technology and Society / Gender, Culture, and Ethics / Data Collection and Analysis

  • Novel Approach for Securing Air-Ground Communication (2012-01-2103)

    The FAA and other Air Navigation Service Providers (ANSPs) plan to share the existing cockpit data radio for NextGen data communication applications. This radio is currently used for supporting airline operations. Sharing this radio, which operates in a relatively open network environment, with mission critical air traffic control communications creates a need to address air-ground security. Most of the data to be shared over air-ground communication is tactical and transient in nature. In addition, secure communication between the controller and the pilot provides situational awareness to all receivers listening on the voice radio channel. In this paper we provide a rationale for securing air-ground communication and explore some of the issues in implementing a secure air-ground communication channel between the controller and the pilot over the shared radio. We recommend a lightweight approach based on Identity Based Encryption (IBE) that meets the security paradigms of confidentiality, integrity, and availability of the system without compromising situational awareness.

  • Vehicle Health Monitoring System Using Secure Wireless Sensor Network (2015-01-0204)

    In this paper we propose a secure wireless sensor network system for vehicle health monitoring (VHM). We discuss the architecture of he proposed model, and it’s implementation in vehicles. Modified AES-CCM is used to provide confidentiality in the network. In the proposed scheme combination of interactive and non-interactive methods are used for reliable message delivery.

  • SWu Tunnel Establishment

    The Internet Protocol Security (IPSec) mechanism defines three databases. The security policy database (SPD) defines the security policy to be applied to input and output traffic for a host or a security gateway. The security association database (SAD) contains the parameters applied to a security association. The peer authorization database (PAD) provides a link between the Internet Key Exchange version 2 (IKEv2) protocol and the SPD. The IPSec mechanism introduces two IPv4 or IPv6 header extensions: authentication header (AH) to ensure the integrity and authentication of IP packets without data encryption; and encapsulating security payload (ESP) ensures the integrity, authentication and confidentiality of IP packets. The IPSec mechanism is implemented for the establishment of the SWu tunnel, at the end of the authentication phase using the 802.1x mechanism, the mobile acting as the initiator and the evolved packet data gateway (ePDG) of the responder.

Standards related to Confidentiality

Back to Top

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...

Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications

The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY) specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.