Confidentiality

View this topic in
Confidentiality is an ethical principle associated with several professions (e.g. , medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties. (Wikipedia.org)






Conferences related to Confidentiality

Back to Top

2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)

The conference will provide an international forum for discussing the latest developments in the field of computational medicine, biomedical informatics and related fields.


2012 3rd International Conference on E-Business and E-Government (ICEE)

ICEE 2012 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances and new techniques in E-Business,E-Commerce and E-Government.

  • 2011 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, Engineering Management, Service Management & Knowledge Management

  • 2010 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, E-education,Engineering Management, Service Management & Knowledge Management


2012 IEEE 20th International Requirements Engineering Conference (RE)

The IEEE International Requirements Engineering Conference is the premier international forum for researchers, educators, practitioners and students to present and discuss the latest innovations, trends, experiences and concerns in the field of Requirements Engineering. Topics of interest related to requirements include elicitation, analysis, specification, validation, modeling, verification, testing, and management.

  • 2010 IEEE 18th International Conference on Requirements Engineering (RE)

    Software systems in today s multi-faceted world are as diverse as the people who use them. While some are built according to rigorous government regulations, others must be delivered quickly to meet time-to-market deadlines or must be responsive to changing business needs. From a requirements engineering perspective there is certainly no one-size-fits-all solution. Diversity is also prevalent across software development teams where end-users, developers, and other stakeholders often c


2012 IEEE 3rd Latin American Symposium on Circuits and Systems (LASCAS)

LASCAS's goal is to be the International Symposium of IEEE Circuits and Systems in Latin America. LASCAS 2012, sponsored by the IEEE Circuits and Systems Society and supported by INAOE, will be held in Playa del Carmen, Mexico. The scope of the conference is on topics related to circuits and systems such as: Analog and Digital Signal Processing, Biomedical Circuits and Systems, Multimedia Systems and Applications, Nanoelectronics, Cellular Neural Networks and Array Computing, Neural Systems and Applications, Circuits and Systems for Communications, Nonlinear Circuits and Systems, Computer-Aided Design, Power Systems and Power Electronic Circuits, Sensory Systems, Graph Theory and Computing, Visual Signal Processing and Communications, Life Science Systems and Applications, VLSI Systems and Applications, Electronic Testing, & Fault Tolerant Circuits.


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


More Conferences

Periodicals related to Confidentiality

Back to Top

Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Lightwave Technology, Journal of

All aspects of optical guided-wave science, technology, and engineering in the areas of fiber and cable technologies; active and passive guided-wave componentry (light sources, detectors, repeaters, switches, fiber sensors, etc.); integrated optics and optoelectronics; systems and subsystems; new applications; and unique field trials.


Network and Service Management, IEEE Transactions on

The online-only IEEE Transactions on Network and Service Management (TNSM) will be committed to the timely publication of archival-quality papers that advance the state-of-the-art and practical applications of network and service management. Both theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. This Transactions will focus on ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Confidentiality

Back to Top

Xplore Articles related to Confidentiality

Back to Top

Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks

Chaminda Alocious; Hannan Xiao; Bruce Christianson 2016 IEEE Wireless Communications and Networking Conference, 2016

Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol ...


Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks

Ndibanje Bruce; Hoon Jae Lee The International Conference on Information Networking 2014 (ICOIN2014), 2014

Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each other's identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret ...


A Concept of Inter-AS Priority Signaling using BGP Attributes

Thomas Martin Knoll Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, 2008

Presents a collection of slides from the author's conference presentation. The proposed approach enables a general OoS based forwarding which allows for informed routing and marking decisions. It is optimized for ease of deployment and adopted to the current poor inter-domain forwarding model. The concept aims for a consistent and widely adopted QoS approximation, which encompasses cross-layer and cross-domain traffic ...


Audio steganography using dual randomness LSB method

Jithu Vimal; Ann Mary Alex 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014

In the current internet scenario, secure data transmission is limited due to its attack made on data communication. So more robust methods are required to ensure secure data transmission. One solution to the above problem is Steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. Least Significant Bit (LSB) technique is ...


H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

Wei Ren; Yi Ren; Hui Zhang 2009 Fifth International Conference on Information Assurance and Security, 2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop- by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve ...


More Xplore Articles

Educational Resources on Confidentiality

Back to Top

eLearning

Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks

Chaminda Alocious; Hannan Xiao; Bruce Christianson 2016 IEEE Wireless Communications and Networking Conference, 2016

Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol ...


Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks

Ndibanje Bruce; Hoon Jae Lee The International Conference on Information Networking 2014 (ICOIN2014), 2014

Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each other's identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret ...


A Concept of Inter-AS Priority Signaling using BGP Attributes

Thomas Martin Knoll Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, 2008

Presents a collection of slides from the author's conference presentation. The proposed approach enables a general OoS based forwarding which allows for informed routing and marking decisions. It is optimized for ease of deployment and adopted to the current poor inter-domain forwarding model. The concept aims for a consistent and widely adopted QoS approximation, which encompasses cross-layer and cross-domain traffic ...


Audio steganography using dual randomness LSB method

Jithu Vimal; Ann Mary Alex 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014

In the current internet scenario, secure data transmission is limited due to its attack made on data communication. So more robust methods are required to ensure secure data transmission. One solution to the above problem is Steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. Least Significant Bit (LSB) technique is ...


H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

Wei Ren; Yi Ren; Hui Zhang 2009 Fifth International Conference on Information Assurance and Security, 2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop- by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve ...


More eLearning Resources

IEEE-USA E-Books

  • Distributed Access Control in Cloud Computing Systems

    With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment.

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • No title

    Increasingly, biomedical scientists and engineers are involved in projects, design, or research and development that involve humans or animals. The book presents general concepts on professionalism and the regulation of the profession of engineering, including a discussion on what is ethics and moral conduct, ethical theories and the codes of ethics that are most relevant for engineers. An ethical decision-making process is suggested. Other issues such as conflicts of interest, plagiarism, intellectual property, confidentiality, privacy, fraud, and corruption are presented. General guidelines, the process for obtaining ethics approval from Ethics Review Boards, and the importance of obtaining informed consent from volunteers recruited for studies are presented. A discussion on research with animals is included. Ethical dilemmas focus on reproductive technologies, stem cells, cloning, genetic testing, and designer babies. The book includes a discussion on ethics and the technologies of body enhancement and of regeneration. The importance of assessing the impact of technology on people, society, and on our planet is stressed. Particular attention is given to nanotechnologies, the environment, and issues that pertain to developing countries. Ideas on gender, culture, and ethics focus on how research and access to medical services have, at times, been discriminatory towards women. The cultural aspects focus on organ transplantation in Japan, and a case study of an Aboriginal child in Canada; both examples show the impact that culture can have on how care is provided or accepted. The final section of the book discusses data collection and analysis and offers a guideline for honest reporting of results, avoiding fraud, or unethical approaches. The appendix presents a few case studies where fraud and/or unethical research have occurred. Table of Contents: Introduction to Ethics / Experiments with Human Subjects or Animals / Examples of Ethical Dilemmas in Biomedical Resea ch / Technology and Society / Gender, Culture, and Ethics / Data Collection and Analysis

  • Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective

    With emerging trends in information and communication technology (ICT), the wireless communication networks facilitate security in cyber???physical networking systems (CPNS) using ubiquitous and pervasive devices that are connected. The Internet of Things (IoT) is a new paradigm of cyber???physical systems that combines ubiquitous and pervasive components, Internet protocol (IP)???based network, radio???frequency identification (RFID) devices, cloud computing services, mobile ad hoc, and sensor networks into a single framework. Energy???aware security and trust management schemes minimize the delay overhead and save energy in RFID devices, sensors, actuators, and smart devices. In the IoT, cloud???enabled features create virtual environments that manage and control the resources in the IoT networks. Security keys define the mechanisms for access control, authentication, confidentiality, and non???repudiation within IoT communication channels. The Web of Things (WoT) is the collection of heterogeneous devices, servers, and network configured to invoke standard web interface and communicate with each other.

  • Gamification and Health

    This chapter contains sections titled: Behavior Change, Behavior Change and Habit, Personal Informatics, Games, and Gamification, The Landscape of Health Behavior Change Applications, Considerations beyond Game Play, Privacy, Confidentiality, and Security, Conclusion, References, Gameography

  • Cloud Security

    The cloud has emerged as a successful computing paradigm, allowing users and organizations to rely on external providers to store and process their data and make it available to others. An increasingly important priority, if there is to be wide adoption and acceptance of cloud computing, is for data owners and users to have security guarantees. Guaranteeing security means ensuring confidentiality and integrity of data, access to it, and computations with it, and ensuring availability of data and services to legitimate users in compliance with agreements with the providers. In this chapter, we present an overview of the main security issues and concerns arising in the cloud scenario, in particular with respect to the storage, management, and processing of data.

  • Employment Contracts and NonCompete Restrictions

    In this chapter we discuss employment contract provisions relating to intellectual property, the ownership of intellectual property and confidentiality agreements and provisions.

  • Contributors

    The realm of the digital offers both new methods of research and new objects of study. Because the digital environment for scholarship is constantly evolving, researchers must sometimes improvise, change their plans, and adapt. These details are often left out of research write-ups, leaving newcomers to the field frustrated when their approaches do not work as expected. _Digital Research Confidential _offers scholars a chance to learn from their fellow researchers' mistakes -- and their successes. The book -- a follow-up to Eszter Hargittai's widely read _Research Confidential_ -- presents behind-the-scenes, nuts-and-bolts stories of digital research projects, written by established and rising scholars. They discuss such challenges as archiving, Web crawling, crowdsourcing, and confidentiality. They do not shrink from specifics, describing such research hiccups as an ethnographic interview so emotionally draining that afterward the researcher retreated to a bathr om to cry, and the seemingly simple research question about Wikipedia that mushroomed into years of work on millions of data points. _Digital Research Confidential _will be an essential resource for scholars in every field. **Contributors**Megan Sapnar Ankerson, danah boyd, Amy Bruckman, Casey Fiesler, Brooke Foucault Welles, Darren Gergle, Eric Gilbert, Eszter Hargittai, Brent Hecht, Aron Hsiao, Karrie Karahalios, Paul Leonardi, Kurt Luther, Vir??????????????????????????????????????????g Moln??????????????????????????????????????????r, Christian Sandvig, Aaron Shaw, Michelle Shumate, Matthew Weber

  • IEEE 802.11i security enhancements

    This chapter contains sections titled: Robust security network (RSN) Transition security networks (TSNs) Confidentiality: New encryption algorithms Fixing WEP: Temporal Key Integrity Protocol (TKIP) New transforms Security management



Standards related to Confidentiality

Back to Top

No standards are currently tagged "Confidentiality"