Confidentiality

View this topic in
Confidentiality is an ethical principle associated with several professions (e.g. , medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties. (Wikipedia.org)






Conferences related to Confidentiality

Back to Top

2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)

The conference will provide an international forum for discussing the latest developments in the field of computational medicine, biomedical informatics and related fields.


2012 3rd International Conference on E-Business and E-Government (ICEE)

ICEE 2012 aims to provide a high-level international forum for researchers and engineers to present and discuss recent advances and new techniques in E-Business,E-Commerce and E-Government.

  • 2011 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, Engineering Management, Service Management & Knowledge Management

  • 2010 International Conference on E-Business and E-Government (ICEE)

    E-Business and E-Commerce,E-Government, E-education,Engineering Management, Service Management & Knowledge Management


2012 IEEE 20th International Requirements Engineering Conference (RE)

The IEEE International Requirements Engineering Conference is the premier international forum for researchers, educators, practitioners and students to present and discuss the latest innovations, trends, experiences and concerns in the field of Requirements Engineering. Topics of interest related to requirements include elicitation, analysis, specification, validation, modeling, verification, testing, and management.

  • 2010 IEEE 18th International Conference on Requirements Engineering (RE)

    Software systems in today s multi-faceted world are as diverse as the people who use them. While some are built according to rigorous government regulations, others must be delivered quickly to meet time-to-market deadlines or must be responsive to changing business needs. From a requirements engineering perspective there is certainly no one-size-fits-all solution. Diversity is also prevalent across software development teams where end-users, developers, and other stakeholders often c


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


2007 IEEE Information Assurance Workshop (IAW)

The workshop provides a forum for Information Assurance researchers and practitioners to share their research and experiences. The focus of this workshop is on innovative designed to address important Information Assurance issues. Papers will be divided into two broad programs. The accepted papers will split approximately 75% will focus on innovative new technical research in Information Assurance and 25% will address recent experience & best practices from educators.



Periodicals related to Confidentiality

Back to Top

Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Lightwave Technology, Journal of

All aspects of optical guided-wave science, technology, and engineering in the areas of fiber and cable technologies; active and passive guided-wave componentry (light sources, detectors, repeaters, switches, fiber sensors, etc.); integrated optics and optoelectronics; systems and subsystems; new applications; and unique field trials.


Network and Service Management, IEEE Transactions on

The online-only IEEE Transactions on Network and Service Management (TNSM) will be committed to the timely publication of archival-quality papers that advance the state-of-the-art and practical applications of network and service management. Both theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. This Transactions will focus on ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Confidentiality

Back to Top

Xplore Articles related to Confidentiality

Back to Top

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Distributed inter-domain SLA negotiation using Reinforcement Learning

Tristan Groléat; Hélia Pouyllau 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011

Applications requiring network Quality of Service (QoS) (e.g. telepresence, cloud computing, etc.) are becoming mainstream. To support their deployment, network operators must automatically negotiate end-to-end QoS contracts (aka. Service Level Agreements, SLAs) and configure their networks accordingly. Other crucial needs must be considered: QoS should provide incentives to network operators, and confidentiality on topologies, resource states and committed SLAs must ...


Securing MPLS Networks with Multi-path Routing

Sahel Alouneh; Abdeslam En-Nouaary; Anjali Agarwal Information Technology, 2007. ITNG '07. Fourth International Conference on, 2007

MPLS network architecture does not protect the confidentiality of data transmitted. This paper proposes a mechanism to enhance the security in MPLS networks by using multi-path routing combined with a modified (k, n) threshold secret sharing scheme. An IP packet entering MPLS ingress router can be partitioned into n shadow (share) packets, which are then assigned to maximally-node disjoint paths ...


RSA algorithm based encryption on secure intelligent traffic system for VANET using Wi-Fi IEEE 802.11p

Megha Nema; Shalini Stalin; Rovin Tiwari 2015 International Conference on Computer, Communication and Control (IC4), 2015

Security over Vehicular ad hoc network using Wi-Fi IEEE 802.11p standard and identifying accurate attacker vehicle is a major challenge over VANET. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge over VANET. In this paper RSA algorithm based encryption and decryption approach and implementing of boundary with double RSU has ...


An Operating System Trusted Security Model for Important Sensitive Information System

Zhao Yong; Liu Ji Qiang; Han Zhen; Shen Chang Xiang The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007

As we all known, confidentiality is the primary demand for sensitive information system, while integrity is as important as it, so we should also protect it from being damaged. Unfortunately, there are some limits for the existing operating system models when dealing with them together. In this paper, the concept of confidentially trusted entity and reliability of integrity are proposed ...


More Xplore Articles

Educational Resources on Confidentiality

Back to Top

eLearning

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Distributed inter-domain SLA negotiation using Reinforcement Learning

Tristan Groléat; Hélia Pouyllau 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011

Applications requiring network Quality of Service (QoS) (e.g. telepresence, cloud computing, etc.) are becoming mainstream. To support their deployment, network operators must automatically negotiate end-to-end QoS contracts (aka. Service Level Agreements, SLAs) and configure their networks accordingly. Other crucial needs must be considered: QoS should provide incentives to network operators, and confidentiality on topologies, resource states and committed SLAs must ...


Securing MPLS Networks with Multi-path Routing

Sahel Alouneh; Abdeslam En-Nouaary; Anjali Agarwal Information Technology, 2007. ITNG '07. Fourth International Conference on, 2007

MPLS network architecture does not protect the confidentiality of data transmitted. This paper proposes a mechanism to enhance the security in MPLS networks by using multi-path routing combined with a modified (k, n) threshold secret sharing scheme. An IP packet entering MPLS ingress router can be partitioned into n shadow (share) packets, which are then assigned to maximally-node disjoint paths ...


RSA algorithm based encryption on secure intelligent traffic system for VANET using Wi-Fi IEEE 802.11p

Megha Nema; Shalini Stalin; Rovin Tiwari 2015 International Conference on Computer, Communication and Control (IC4), 2015

Security over Vehicular ad hoc network using Wi-Fi IEEE 802.11p standard and identifying accurate attacker vehicle is a major challenge over VANET. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge over VANET. In this paper RSA algorithm based encryption and decryption approach and implementing of boundary with double RSU has ...


An Operating System Trusted Security Model for Important Sensitive Information System

Zhao Yong; Liu Ji Qiang; Han Zhen; Shen Chang Xiang The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007

As we all known, confidentiality is the primary demand for sensitive information system, while integrity is as important as it, so we should also protect it from being damaged. Unfortunately, there are some limits for the existing operating system models when dealing with them together. In this paper, the concept of confidentially trusted entity and reliability of integrity are proposed ...


More eLearning Resources

IEEE-USA E-Books

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • Find and Become a Mentor

    This chapter provides recommendations for finding the right mentor and also becoming one. It is not always easy to find a mentor, if found, take full advantage of every minute that have to spend with this experienced professional who has committed to help to achieve goals. While having a mentor is an important part of advancing the career, being one is just as important. Giving to others will help in growing tremendously, both personally and professionally. If a person has decided to become a mentor, the next step will be to find a Prot??g?? to work with. Confidentiality and accountability are key factors in a successful relationship. As the mentor, the person provides some guidelines for how the actual relationship will work. The chapter provides some recommendations for delicately ending the mentoring relationship. It lists some of the things not to do for both the Prot??g?? and mentor.

  • Network Security

    This chapter contains sections titled: Introduction Energy Cost of Embedded Security for Wireless Sensor Networks Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks Fast and Scalable Key Establishment in Sensor Networks Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks References

  • Contributors

    The realm of the digital offers both new methods of research and new objects of study. Because the digital environment for scholarship is constantly evolving, researchers must sometimes improvise, change their plans, and adapt. These details are often left out of research write-ups, leaving newcomers to the field frustrated when their approaches do not work as expected. _Digital Research Confidential _offers scholars a chance to learn from their fellow researchers' mistakes -- and their successes. The book -- a follow-up to Eszter Hargittai's widely read _Research Confidential_ -- presents behind-the-scenes, nuts-and-bolts stories of digital research projects, written by established and rising scholars. They discuss such challenges as archiving, Web crawling, crowdsourcing, and confidentiality. They do not shrink from specifics, describing such research hiccups as an ethnographic interview so emotionally draining that afterward the researcher retreated to a bathr om to cry, and the seemingly simple research question about Wikipedia that mushroomed into years of work on millions of data points. _Digital Research Confidential _will be an essential resource for scholars in every field. **Contributors**Megan Sapnar Ankerson, danah boyd, Amy Bruckman, Casey Fiesler, Brooke Foucault Welles, Darren Gergle, Eric Gilbert, Eszter Hargittai, Brent Hecht, Aron Hsiao, Karrie Karahalios, Paul Leonardi, Kurt Luther, Vir??????????????????????????????????????????g Moln??????????????????????????????????????????r, Christian Sandvig, Aaron Shaw, Michelle Shumate, Matthew Weber

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • Gamification and Health

    This chapter contains sections titled: Behavior Change, Behavior Change and Habit, Personal Informatics, Games, and Gamification, The Landscape of Health Behavior Change Applications, Considerations beyond Game Play, Privacy, Confidentiality, and Security, Conclusion, References, Gameography

  • Index

    The realm of the digital offers both new methods of research and new objects of study. Because the digital environment for scholarship is constantly evolving, researchers must sometimes improvise, change their plans, and adapt. These details are often left out of research write-ups, leaving newcomers to the field frustrated when their approaches do not work as expected. _Digital Research Confidential _offers scholars a chance to learn from their fellow researchers' mistakes -- and their successes. The book -- a follow-up to Eszter Hargittai's widely read _Research Confidential_ -- presents behind-the-scenes, nuts-and-bolts stories of digital research projects, written by established and rising scholars. They discuss such challenges as archiving, Web crawling, crowdsourcing, and confidentiality. They do not shrink from specifics, describing such research hiccups as an ethnographic interview so emotionally draining that afterward the researcher retreated to a bathr om to cry, and the seemingly simple research question about Wikipedia that mushroomed into years of work on millions of data points. _Digital Research Confidential _will be an essential resource for scholars in every field. **Contributors**Megan Sapnar Ankerson, danah boyd, Amy Bruckman, Casey Fiesler, Brooke Foucault Welles, Darren Gergle, Eric Gilbert, Eszter Hargittai, Brent Hecht, Aron Hsiao, Karrie Karahalios, Paul Leonardi, Kurt Luther, Vir??????????????????????????????????????????g Moln??????????????????????????????????????????r, Christian Sandvig, Aaron Shaw, Michelle Shumate, Matthew Weber

  • No title

    Increasingly, biomedical scientists and engineers are involved in projects, design, or research and development that involve humans or animals. The book presents general concepts on professionalism and the regulation of the profession of engineering, including a discussion on what is ethics and moral conduct, ethical theories and the codes of ethics that are most relevant for engineers. An ethical decision-making process is suggested. Other issues such as conflicts of interest, plagiarism, intellectual property, confidentiality, privacy, fraud, and corruption are presented. General guidelines, the process for obtaining ethics approval from Ethics Review Boards, and the importance of obtaining informed consent from volunteers recruited for studies are presented. A discussion on research with animals is included. Ethical dilemmas focus on reproductive technologies, stem cells, cloning, genetic testing, and designer babies. The book includes a discussion on ethics and the technologies of body enhancement and of regeneration. The importance of assessing the impact of technology on people, society, and on our planet is stressed. Particular attention is given to nanotechnologies, the environment, and issues that pertain to developing countries. Ideas on gender, culture, and ethics focus on how research and access to medical services have, at times, been discriminatory towards women. The cultural aspects focus on organ transplantation in Japan, and a case study of an Aboriginal child in Canada; both examples show the impact that culture can have on how care is provided or accepted. The final section of the book discusses data collection and analysis and offers a guideline for honest reporting of results, avoiding fraud, or unethical approaches. The appendix presents a few case studies where fraud and/or unethical research have occurred. Table of Contents: Introduction to Ethics / Experiments with Human Subjects or Animals / Examples of Ethical Dilemmas in Biomedical Resea ch / Technology and Society / Gender, Culture, and Ethics / Data Collection and Analysis

  • IP Security

    This chapter contains sections titled: Introduction Security of Telecommunications Services Security Objectives OSI Model for Cryptographic Security Message Confidentiality Data Integrity Identification of Participants Authentication of Participants Access Control Nonrepudiation Secure Management of Cryptographic Keys Exchange of Secret Keys: Kerberos Exchange of Public Keys Certificate Management Applications for Network Management Encryption Cracks Summary Appendix I: Areas Related to Security Policies Appendix II: Principles of Symmetric Encryption AII.1 Modes of Algorithm Utilization for Block Encryption AII.2 Examples of Symmetric Block Encryption Algorithms Appendix III: Principles of Public Key Encryption AIII.1 RSA AIII.2 Public Key Cryptography Standards AIII.3 Pretty Good Privacy AIII.4 Elliptic Curve Cryptography Appendix IV: Principles of the Digital Signature Algorithm References

  • Employment Contracts and NonCompete Restrictions

    In this chapter we discuss employment contract provisions relating to intellectual property, the ownership of intellectual property and confidentiality agreements and provisions.



Standards related to Confidentiality

Back to Top

No standards are currently tagged "Confidentiality"