Confidentiality

View this topic in
Confidentiality is an ethical principle associated with several professions (e.g. , medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties. (Wikipedia.org)






Conferences related to Confidentiality

Back to Top

2019 IEEE 17th International Conference on Industrial Informatics (INDIN)

Industrial information technologies


2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.


2019 IEEE Photonics Society Summer Topical Meeting Series (SUM)

The Topical Meetings of the IEEE Photonics Society are the premier conference series for exciting, new areas in photonic science, technology, and applications; creating the opportunity to learn about emerging fields and to interact with the research and technology leaders in an intimate environment.


2019 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


GLOBECOM 2019 - 2019 IEEE Global Communications Conference

Provides a full program of technical and professional activities spanning hot topics in voice, data, image and multimedia communications and networking.


More Conferences

Periodicals related to Confidentiality

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Electromagnetic Compatibility, IEEE Transactions on

EMC standards; measurement technology; undesired sources; cable/grounding; filters/shielding; equipment EMC; systems EMC; antennas and propagation; spectrum utilization; electromagnetic pulses; lightning; radiation hazards; and Walsh functions


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Confidentiality

Back to Top

Xplore Articles related to Confidentiality

Back to Top

The Research and Design of 3G Terminal Data Confidentiality Services

2010 International Conference on E-Business and E-Government, 2010

3GPP does not supply any active security service interface or available security algorithm model for the terminals, which restricts the initiative ability and configuration ability of security communication on the application layer in a great deal. Focusing on this problem, we firstly brought forward three-layer architecture which guarantees application layer's communication security of 3G terminals, researched secure confidentiality service model ...


Tuning On-Air Signatures for Balancing Performance and Confidentiality

IEEE Transactions on Knowledge and Data Engineering, 2009

In this paper, we investigate the trade off between performance and confidentiality in signature-based air indexing schemes for wireless data broadcast. Two metrics, namely, false drop probability and false guess probability, are defined to quantify the filtering efficiency and confidentiality loss of a signature scheme. Our analysis reveals that false drop probability and false guess probability share a similar trend ...


Enhancing Optical-CDMA Confidentiality With Multicode-Keying Encryption

Journal of Lightwave Technology, 2015

Optical codes with large cardinality and tree structures of multiple subsets of codewords for adjustable code performance and cardinality have recently been proposed. As studied in this paper, these characteristics support multicode-keying encryption for enhancing physical-layer confidentiality in optical code-division multiple-access systems and networks. The concept of the multicode-keying encryption technique is introduced. The associated all- optical hardware is designed ...


Study on several confidentiality protection technologies for electronic document

Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), 2013

As a usual information media in organizations, electronic document often relates to important information that should be kept confidential. The no- authorized access, unauthorized use and uncontrolled spread of electronic document will bring great loss to organizations. Therefore, ensuring the security of electronic document, preventing information from leaking and uncontrolled spreading are basic requirements of organizations' office affairs. Focusing on ...


Data confidentiality challenges in big data applications

2015 IEEE International Conference on Big Data (Big Data), 2015

In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure ...


More Xplore Articles

Educational Resources on Confidentiality

Back to Top

IEEE-USA E-Books

  • The Research and Design of 3G Terminal Data Confidentiality Services

    3GPP does not supply any active security service interface or available security algorithm model for the terminals, which restricts the initiative ability and configuration ability of security communication on the application layer in a great deal. Focusing on this problem, we firstly brought forward three-layer architecture which guarantees application layer's communication security of 3G terminals, researched secure confidentiality service model which is convenient for developers, the algorithm consultation mechanism used in the application layer and the security algorithm model F8* which guarantees the confidentiality of terminal data transmission are included. It is indicated that models and functions raised in this article are able to be used to supply active, visible and selectable confidentiality service for terminals.

  • Tuning On-Air Signatures for Balancing Performance and Confidentiality

    In this paper, we investigate the trade off between performance and confidentiality in signature-based air indexing schemes for wireless data broadcast. Two metrics, namely, false drop probability and false guess probability, are defined to quantify the filtering efficiency and confidentiality loss of a signature scheme. Our analysis reveals that false drop probability and false guess probability share a similar trend as the tuning parameters of a signature scheme change and it is impossible to achieve a low false drop probability and a high false guess probability simultaneously. In order to balance the performance and confidentiality, we perform an analysis to provide a guidance for parameter settings of the signature schemes to meet different system requirements. In addition, we propose the jump pointer technique and the XOR signature scheme to further improve the performance and confidentiality. A comprehensive simulation has been conducted to validate our findings.

  • Enhancing Optical-CDMA Confidentiality With Multicode-Keying Encryption

    Optical codes with large cardinality and tree structures of multiple subsets of codewords for adjustable code performance and cardinality have recently been proposed. As studied in this paper, these characteristics support multicode-keying encryption for enhancing physical-layer confidentiality in optical code-division multiple-access systems and networks. The concept of the multicode-keying encryption technique is introduced. The associated all- optical hardware is designed and validated with OptiSystem™ simulation. The theoretical analyses of confidentiality improvement by means of rapid codeword switching and multicode-keying encryption are formulated.

  • Study on several confidentiality protection technologies for electronic document

    As a usual information media in organizations, electronic document often relates to important information that should be kept confidential. The no- authorized access, unauthorized use and uncontrolled spread of electronic document will bring great loss to organizations. Therefore, ensuring the security of electronic document, preventing information from leaking and uncontrolled spreading are basic requirements of organizations' office affairs. Focusing on confidentiality, which is the most important features of information security, this study collected and summarized several effective security technologies for electronic document, such as access control list, password, encrypting file system and information rights management, discussed the safety features through analysis of their operational principle and a comparative analysis. The study suggests that IRM is the most perfect and effective security technology for electronic document, organizations should choose the suitable safety technical measures according to actual needs and IT infrastructure.

  • Data confidentiality challenges in big data applications

    In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.

  • A model for ensuring data confidentiality: In healthcare and medical emergency

    Data confidentiality is a major problem for healthcare and medical emergency system since it accumulates significant information. Sharing and transmission of private via Internet leads to easily intercept it by unauthorized parties. Attackers need to access private information by capturing data transmission and forging themselves as authorized user. Multilevel security is needed in Healthcare and Medical Emergency since its database contains information of various confidentiality levels. This research, address the confidentiality issue by designing and developing new model for data confidentiality. It provides a view of data sensitivity and suggests areas in cryptography to protect data at different sensitivity levels. The proposed model protects transmitting data using role-base security policy and cryptographic system. We classified related information into several sensitivity levels. A suitable cryptography is provided for each level of data sensitivity to support this System. Result of implementation shows that it keeps specific sensitive data confidential at a certain degree with a good performance comparing with normal system and existing security protocols such as SSL and PGP. Furthermore, the cost of encryption and decryption is not high and kept at acceptable level.

  • An integrated security mechanism for network coding combining confidentiality and integrity

    Network coding, whose intermediate nodes decode and encode packets to forward incoming packets, increases the capacity the multicast network. However there are security issues of confidentiality and integrity which degrade and threat network coding. In this paper, we propose secure key checksum (SKC), a secure mechanism using an encryption key, to provide both confidentiality and integrity. To provide the confidentiality, SKC utilizes a block encryption. For the integrity check, SKC uses a checksum based scheme verifying encoded blocks on-the-fly with low computational cost. Also, SKC uses a combined security key for encryption and checksum.

  • AES and Confidentiality from the inside out

    Information Confidentiality has a prominent significance in the study of ethics, law and most recently in Information Systems. With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure. There are arrays of encryption systems those are being deployed in the world of Information Systems by various organizations. However, for the wider use, we need to adapt to a particular encryption method and standard. This paper is intended to be an easy to follow tutorial on the principles of Information Security, Information Confidentiality and their underlying standards. This paper also thoroughly explains the inner working of an encryption standard known as Advanced Encryption Standard or AES.

  • Work in Progress: An Confidentiality and Integrity Scheme for the Distributed Shared Memory of Embedded Multi-core System

    For the multi-core systems, the distributed shared memory(DSM) has become the mainstream for its scalability and portable. A new security policy needs to be designed to protect the data in the DSM. In this paper, a memory confidentiality protection method is designed based on the dynamic key and compression counter(CPS), The method improves the encryption efficiency significantly and solves the problem of the ciphertext re-encrypting when the counter overflows. A memory integrity protection method is proposed based on a multi-granularity incremental hash tree(MIT), to reduce the memory occupation and the amount of calculation. A secondary conversion method of the ciphertext is designed so that the data can be transmitted among the untrusted processing units without sharing the private keys. The optimized methods are quantitatively evaluated using the SimpleScalar architecture simulation tool. Experimental results show that the performance degradation of the proposed confidentiality protection method is 11.84% on average, which is better than the split counter mode(SPLIT) method and the block encryption method. The proposed integrity protection method has a 48.72% reduction in memory occupation and a 32.62% improvement in the performance reduction rate compared with the hash-tree method, it's better than the multi-grained hash tree(MGT) method and the Bonsai Merkle Tree(BMT) method too.

  • Empowering users of cloud computing on data confidentiality

    Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing secret keys. We propose an approach for secure transmission of matrix multiplication over cloud networking using randomisation, column-row shuffling and size alteration of matrices. The main philosophy of this approach is to equip cloud users with more controls of ensuring confidentiality of their data without using any additional overhead computation. In this approach, the cloud users hold the entire secret values, without sharing with or depending on other parties for secret key generation, sharing and storing.



Standards related to Confidentiality

Back to Top

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications

The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY) specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.