3,648 resources related to Data Protection
- Topics related to Data Protection
- IEEE Organizations related to Data Protection
- Conferences related to Data Protection
- Periodicals related to Data Protection
- Most published Xplore authors for Data Protection
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
IEEE International Conference on Plasma Science (ICOPS) is an annual conference coordinated by the Plasma Science and Application Committee (PSAC) of the IEEE Nuclear & Plasma Sciences Society.
The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.
Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission
Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 2018
Protecting sensitive data is a key concern for the adoption of cloud solutions. Protecting data in the cloud is made particularly challenging by the dynamic changes that cloud systems may undergo at run-time, as well as the complex interactions among multiple software and hardware components, services, and stakeholders. Conformance to data protection requirements in such a dynamic environment cannot any ...
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
In this paper the methods of data protection for developed by authors earlier multichannel system of quantum secure communication are proposed. These methods allow closing the intercepted data from the unauthorized user. The simulation model of quantum secure communication system on optical fiber is developed. This model depends on three parameters: probabilities of an error in the fiber optic channel, ...
2017 16th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2017
The social networks are used by millions of users. Depending on the social media platform, members may be able to contact any other member. In other cases, members can contact anyone they have a connection to, and subsequently anyone that contact has a connection to, and so on. Some services require members to have a preexisting connection to contact other ...
2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2018
In this extended abstract, we consider one important aspect of security: the protection of sensitive data from unauthorized access. We argue that (i) self- adaptation may facilitate the efficient protection of sensitive data; (ii) data protection has peculiar properties that make its treatment different from other quality attributes; and (iii) data protection should be considered in combination with other quality ...
2018 5th International Conference on Information Science and Control Engineering (ICISCE), 2018
One of the most promising applications in cloud computing is online data sharing. How to share user data safely and efficiently has become one of the most challenging problems in cloud computing. Encryption attribute access control is a powerful guarantee against unauthorized users from accessing sensitive data in the cloud. However, it only increases the difficulty of illegal data access. ...
Keynote Address and Opening Remarks - IEEE AI & Ethics Summit 2016
Technology for Health Summit 2017 - Panel II: Managing the data deluge linked to connected technology in health
Challenges of Big Data on a Global Scale: 2017 Brain Fuel President's Chat
Group on Earth Observations(GEOSS): Applications
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Working Group Reports - ETAP Forum Namibia, Africa 2017
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Coordination of NFPA and IEEE Consensus Document Development
Social Implications: Perils & Promises of AI - IEEE AI & Ethics Summit 2016
Shaping the Future Workforce: Transformative Impacts of Emerging Technologies | IEEE TechEthics Public Forum
The Moral Importance of Cybersecurity | IEEE TechEthics Virtual Panel
2013 IEEE John Von Neumann Medal
Flood or Hurricane Protection?: The New Orleans Levee System and Hurricane Katrina
The Intergrid - Safe, Dependable, Sustainable: IECON 2018
Heuristics for Design for Reliability in Electrical and Electronic Products
Explorations in BIG Data and sMall Data with a Fuzzy Perspective
Q&A with Dr. Sorel Reisman: IEEE Big Data Podcast, Episode 2
Abstraction and Modeling of Cyber Security tutorial, Part 1
Protecting sensitive data is a key concern for the adoption of cloud solutions. Protecting data in the cloud is made particularly challenging by the dynamic changes that cloud systems may undergo at run-time, as well as the complex interactions among multiple software and hardware components, services, and stakeholders. Conformance to data protection requirements in such a dynamic environment cannot any longer be ensured during design time; e.g. due to the dynamic changes imposed by replication and migration of components. It requires run-time data protection mechanisms. This paper proposes combining multiple existing data protection approaches and extending them to run-time, ultimately delivering an end-to-end architecture for run- time data protection in the cloud. We validate the practical applicability of our approach by a commercial case study.
In this paper the methods of data protection for developed by authors earlier multichannel system of quantum secure communication are proposed. These methods allow closing the intercepted data from the unauthorized user. The simulation model of quantum secure communication system on optical fiber is developed. This model depends on three parameters: probabilities of an error in the fiber optic channel, time of detection of unauthorized connection to the fiber optic line and transmission rate. Results of modeling for two methods of data protection are presented.
The social networks are used by millions of users. Depending on the social media platform, members may be able to contact any other member. In other cases, members can contact anyone they have a connection to, and subsequently anyone that contact has a connection to, and so on. Some services require members to have a preexisting connection to contact other members . According to , the number of unique visitors on some social platforms is: Facebook - 1,500,000,000 - Estimated Unique Monthly Visitors, YouTube - 1,499,000,000 - Estimated Unique Monthly Visitors, Twitter - 400,000,000, Instagram - 275,000,000 Visitors/month, LinkedIn - 250,000,000 Visitors/month. The main scope of a social network is to interconnect persons with common interests. They can also be used in business. The paper is a study about social media and consists of an original research based on a questionnaire with more than 300 of respondents. Some of the investigated issues are: the security in the social networks, the scope of the use of social networks, personal data protection, identity theft, the dependence of the use of social media, etc. The results of the research provide a basis that is useful to understand the importance of the use of social networks and also the personal data protection in such platforms. The paper also provides useful findings for the online community regarding the use of social platforms and the protection of person on such virtual medium.
In this extended abstract, we consider one important aspect of security: the protection of sensitive data from unauthorized access. We argue that (i) self- adaptation may facilitate the efficient protection of sensitive data; (ii) data protection has peculiar properties that make its treatment different from other quality attributes; and (iii) data protection should be considered in combination with other quality attributes like performance and costs.
One of the most promising applications in cloud computing is online data sharing. How to share user data safely and efficiently has become one of the most challenging problems in cloud computing. Encryption attribute access control is a powerful guarantee against unauthorized users from accessing sensitive data in the cloud. However, it only increases the difficulty of illegal data access. It does not know whether data has illegal access in time, nor can it adopt timely optimization and adjustment of access control policies. Based on the encryption attribute access control strategy, this paper provides a data protection model, and provides a data access detection algorithm, forms a closed-loop control, provides timely feedback evidence for continuous optimization of data access control strategies, and improves data protection's integrity.
Internet is rapidly growing because it offers the easier and interconnected digital lifestyle. The growth also brings data security threats. Data are used to be protected by encryption. Encryption morphs the data into unreadable series of code which obey a certain rule. But the way encryption did to the data make the existence of precious data is exposed to danger. Steganography which differ from cryptography offers a stealth data protection without make any suspicion to the existence of data. Steganography hides the data through images, audio files, TCP/IP, etc. Phase encoded steganography is a robust information hiding method on audio file. It is because the ability to deceive human auditory system perception. Exploiting the insensitivity of human auditory system to distinguish a slight phase difference, interaural phase encoding sound modification turn out to be undetectable. Utilizing the base-4 and hexadecimal code number basis, instead of binary, embedded data capacity can grow significantly. At 33 dB SNR, it is possible to embed 1500 bit data per second. The higher code number base and the higher number of segmentation, the more minimum modification would happen on time domain. These base-4 and hexadecimal encoding are quite robust against attack based on amplification and filtering.
In the introduction authors explain recent developments with regard to regulation of personal data protection aspects of cloud computing services at European Union level. This is followed by analysis of the relevant EU legal framework and interpretations on its application to data processing in the context of cloud computing, and of the data protection legal framework of the Republic of Croatia and guidance on data protection in cloud computing issued by the relevant regulatory authority, i.e. Personal Data Protection Agency. Authors next examine proposed new EU general data protection framework that is currently in legislative process (Proposal for General Data Protection Regulation). This research focuses on selected provisions of the most recent draft text adopted by the European Parliament (amending the 2012 Commission's original proposal) that are likely to significantly impact the EU cloud computing market. Authors conclude overall analysis in the paper with assessment of likely impacts of analyzed solutions for cloud computing clients and providers, and in relation to legislation that is currently in force. While estimating that relevant legislation and practice in Croatia will further develop in line with the EU framework, research in this paper aims to more generally contribute to development of domestic legal writing in the area and to the raising of public awareness on legal data protection issues that need to be considered when switching to domesticthe cloud.
The recently approved General Data Protection Regulation (GDPR) will change deeply the European privacy framework. Despite the aim of updating the legislative provisions to the challenges of the information society, the GDPR leaves open serious questions and shortcomings, especially in the context of cloud computing for s-health. The purpose of the paper is twofold: after having outlined the major innovations of the new GDPR for ensuring data protection in cloud environments, paying particular attention to the processing in the healthcare sector, the main unresolved issues will be critically addressed.
Data protection by design is a principle to systems development meaning that the protection of personal data is built into the systems design from the start. For many jurisdictions, this principle is becoming a legal requirement. Using a research approach based on design science, a framework is constructed helping systems developers achieve privacy by design in a systematic manner. The framework articulate how the business requirements can be captured, assessed, and implemented in the systems development. Examples of how the data protection principles can be concretely implemented is also presented.
Disk drive failure related data lost remains a major threat to storage system reliability. Current counter-measurement all focused on reactive data protection, such as using RAID or erasure coding to reconstruct data after failure occurs. We argue that post-failure recovery will not scalable when the storage demand keep increase. In this paper, we present a proactive data protection (PDP) framework within the ZFS file system to rescue data from disks before actual failure onset. By reducing the risk of data loss and mitigating the prolonged disk rebuilds caused by disk failures, PDP is designed to enhance the overall storage reliability. We extensively evaluate the recovery performance of ZFS with diverse configurations, and further explore disk failure prediction techniques to develop a proactive data protection mechanism in ZFS. We further compare the performance of different data protection strategies, including post-failure disk recovery, proactive disk cloning, and proactive data recovery. We propose an analytic model that uses storage utilization and contextual system information to select the best data protection strategy that can save up to 70% of data rescue time.
his standard revises and enhances the VHDL language reference manual (LRM) by including a standard C language interface specification; specifications from previously separate, but related, standards IEEE Std 1164 -1993,1 IEEE Std 1076.2 -1996, and IEEE Std 1076.3-1997; and general language enhancements in the areas of design and verification of electronic systems.
This guide outlines the techniques and application considerations for determining the location of a fault on ac transmission and distribution lines. This document reviews traditional approaches and the primary measurement techniques used in modern devices: one-terminal and two-terminal impedance-based methods and traveling wave methods. Application considerations include: two- and three-terminal lines, series-compensated lines, parallel lines, untransposed lines, underground cables, fault ...
The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...
This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...
Privacy Compliance Engineer
Commerce Engineer, Apple Media Products
Engineering Program Manager, Commerce Program
Data Governance Lead - Wallet, Payments & Commerce Analytics
Commerce (Data Compliance) Engineering Program Manager