Conferences related to Data Privacy

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium

All fields of satellite, airborne and ground remote sensing.


2019 11th International Conference on Computational Intelligence and Communication Networks (CICN)

11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.

  • 2018 10th International Conference on Computational Intelligence and Communication Networks (CICN)

    10th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Image, Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• Digital Design, VLSI and SOC • Data Mining, Big data, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence • Power Electronics, Transmission and Power Systems • Computer Vision and Artificial Intelligence • Bio-informatics, Biometry and Medical Imaging• Information security,Network Security and Steganography • Remote sensing and GIS

  • 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN ? Sensors and networks (wireless ad hoc N/W, Vehicular N/W) ? Acoustic and under water electronics/communication and sonar systems ? Signal and Speach Processing ? Microwave IC, antennas and Wave Propagation ? Modeling and simulation ? VLSI Design and SOC ? Data Mining, Ontology and Web Services ? Parallel and distributed systems ? Telecommunication and Mobile communication ? Grid, Cloud, High Speed/Performance and Green Computing ? RFIDs and applicatons ? Embedded systems and Hardware Design/Implementation ? Mobile Computing, Computational Intelligence

  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• VLSI Design and SOC • Data Mining, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence

  • 2014 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN 2014) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation. The conference will provide an exceptional platform to the researchers to meet and discuss the utmost solutions, scientific results and methods in solving intriguing problems with people that actively involved in these evergreen fields. T

  • 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN)

    Topics

  • 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

    The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.

  • 2011 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.

  • 2010 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2010) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


2019 20th IEEE International Conference on Mobile Data Management (MDM)

The MDM series of conferences, since its debut in 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The conference provides unique opportunities to bring researchers, engineers, and practitioners together to explore new ideas, techniques, and tools, and exchange experiences. Comprising both research and industry tracks, it serves as an important bridge between academic researchers and industry researchers. Along with the presentations of research publications, it also serves as a meeting place for technical demonstrations (demos), workshops, advanced seminars, panel discussions as well as Industrial forum to cater industrial developers.The conference focuses on research contributions in data management in mobile, ubiquitous and pervasive computing.

  • 2018 19th IEEE International Conference on Mobile Data Management (MDM)

    The conference aims to attract original research contributions in the interesection of mobile computing and data management. Topics of interest include, but not limited to:- Mobile Cloud Computing and Data Management - Data Management for Internet of Things (IoT) and Sensor Systems- Data Management for Augmented Reality Systems- Data Management for Intelligent Transportation Systems, Smart Spaces- Mobile Crowd-Sourcing and Crowd-Sensing- Mobile Data Analytics- Behavioural/Activity Sensing and Analytics- Mobile Location-Based Social Networks- Mobile Recommendation Systems- Context-aware Computing for Intelligent Mobile Services- Middleware and Tools for Mobile and Pervasive Computing- Theoretical Foundations of Data-intensive Mobile Computing- Data Stream Processing in Mobile/Sensor Networks- Indexing, Optimisation and Query Processing for Moving Objects/Users- Security and Privacy in Mobile Systems

  • 2017 18th IEEE International Conference on Mobile Data Management (MDM)

    Mobile computing and data management

  • 2016 17th IEEE International Conference on Mobile Data Management (MDM)

    The Mobile Data Management series of conferences first debuted in December 1999. Since inception, it has established itself as a prestigious forum to exchange innovative and significant research results in mobile data management. Comprising both research and industry tracks, it serves as an important bridge between academic researchers and industry researchers. Along with the presentations of research publications, it also serves as a meeting place for technical demonstrations (Demos), workshops, panel discussions as well as PhD forum and Industrial forum to cater PhD students and industrial developers.The conference focuses on research contributions in data management in mobile, ubiquitous and pervasive computing.

  • 2015 16th IEEE International Conference on Mobile Data Management (MDM)

    The MDM series of conferences, since its debut in December 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The term mobile in MDM has been used from the very beginning in a broad sense to encompass all aspects of mobility related to wireless, portable and tiny devices. The conference provides unique opportunities for researchers, engineers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences.

  • 2014 15th IEEE International Conference on Mobile Data Management (MDM)

    The MDM series of conferences, since its debut in December 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The term mobile in MDM has been used from the very beginning in a broad sense to encompass all aspects of mobility

  • 2013 14th IEEE International Conference on Mobile Data Management (MDM)

    The MDM series of conferences, since its debut in December 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The term mobile in MDM has been used from the very beginning in a broad sense to encompass all aspects of mobility - aspects related to wireless, portable and tiny devices. The conference provides unique opportunities for researchers, engineers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences.

  • 2012 13th IEEE International Conference on Mobile Data Management (MDM)

    The MDM series of conferences, since its debut in December 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The term mobile in MDM has been used from the very beginning in a broad sense to encompass all aspects of mobility - aspects related to wireless, portable and tiny devices. The conference provides unique opportunities for researchers, engineers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences.

  • 2011 12th IEEE International Conference on Mobile Data Management (MDM)

    The MDM series of conferences, since its debut in December 1999, has established itself as a prestigious forum for the exchange of innovative and significant research results in mobile data management. The term mobile in MDM has been used from the very beginning in a broad sense to encompass all aspects of mobility - aspects related to wireless, portable and tiny devices. The conference provides unique opportunities for researchers, engineers, practitioners, developers, and users to explore new ideas.

  • 2010 11th International Conference on Mobile Data Management (MDM)

    The annual MDM conference is a leading international forum that focuses on data management for mobile, ubiquitous, and pervasive computing. It brings together a wide range of researchers, practitioners, and users to explore scientific and industrial challenges that arise in the areas of data management and mobile computing.

  • 2008 9th International Conference on Mobile Data Management (MDM)

  • 2007 International Conference on Mobile Data Management (MDM)

  • 2006 International Conference on Mobile Data Management (MDM)

  • 2004 IEEE International Conference on Mobile Data Management (MDM)


2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)

This conference presents excellent, novel, and contemporary papers covering all aspects of Data ? including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights; and, to create visualizations to aid in presenting and understanding the data. System development and integration needs to also adapt to these new algorithms, technologies, tools, and needs. This conference and its constituents support the development of technologies and applications for peaceful purposes to improve the human condition.


More Conferences

Periodicals related to Data Privacy

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Architecture Letters

Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing


More Periodicals

Most published Xplore authors for Data Privacy

Back to Top

Xplore Articles related to Data Privacy

Back to Top

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws

2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. ...


An approach for data privacy in hybrid cloud environment

2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011), 2011

The cloud computing immerges as a new computing technology where all required services are available as a service. In a cloud environment, location of data is generally maintained by a third party (service provider/vendor) and hence an individual has no control over its own data. In this context, data privacy is an important issue for cloud computing both in terms ...


Hybrid intelligent access control framework to protect data privacy and theft

2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015

Web application usage has grown in the past few years. As a result more and more transactions are taking place via the web. Attacks have grown in sophistication and number. A database is a favorite target of attackers. As a result key challenge is to protect data privacy and prevent data theft. In this paper, a Hybrid Intelligent Database Security ...


STT-MRAM Application on IoT Data Privacy Protection System

2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2018

One of the major problem of Internet of Things (IoT) is that the limitation of the currently available technology cannot simultaneously provided the solution of lower power consumption, higher intelligence, higher security and non- volatile which are critical for IoT designing. Spin torque transfer magnetic random access memory (STT-MRAM) based on magnetic tunneling junction (MTJ), in addition to a high ...


Does Industry Self-Regulation of Consumer Data Privacy Work?

IEEE Security & Privacy, 2017

Data privacy and security have generated far less evaluative research to date about different policy interventions than many other industries. As the public, government, and industry continue to consider data privacy as a product subject to contract, transaction, and fair treatment, the need for practical assessments of privacy and security will grow. This will require the cooperation of multiple research ...


More Xplore Articles

Educational Resources on Data Privacy

Back to Top

IEEE-USA E-Books

  • The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws

    Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. There are already issues within recent history which show a lack of alignment causing a great deal of confusion, an example of this is the 'right to be forgotten' case which came up in 2014. This case involved a Spanish man against Google Spain. He requested the removal of a link to an article about an auction for his foreclosed home, for a debt that he had subsequently paid. However, misalignment of data privacy laws caused further complications to the case. This paper introduces the Waikato Data Privacy Matrix, our global project for alignment of data privacy laws by focusing on Asia Pacific data privacy laws and their relationships with the European Union and the USA. This will also suggest potential solutions to address some of the issues which may occur when a breach of data privacy occurs, in order to ensure an individual has their data privacy protected across the boundaries in the Web. With the increase in data processing and storage across different jurisdictions and regions (e.g. public cloud computing), the Waikato Data Privacy Matrix empowers businesses using or providing cloud services to understand the different data privacy requirements across the globe, paving the way for increased cloud adoption and usage.

  • An approach for data privacy in hybrid cloud environment

    The cloud computing immerges as a new computing technology where all required services are available as a service. In a cloud environment, location of data is generally maintained by a third party (service provider/vendor) and hence an individual has no control over its own data. In this context, data privacy is an important issue for cloud computing both in terms of legal compliance and user trust. In this paper, an approach for data privacy in hybrid cloud environment is focused. Initially, a data privacy model for cloud computing is provided in which sensitive and non-sensitive data are maintained separately. In order to maintain data privacy, an authentication monitor is introduced in this privacy model. Finally, the authentication algorithm is implemented in a very small setup cloud environment and experimental results are provided at the end of the paper.

  • Hybrid intelligent access control framework to protect data privacy and theft

    Web application usage has grown in the past few years. As a result more and more transactions are taking place via the web. Attacks have grown in sophistication and number. A database is a favorite target of attackers. As a result key challenge is to protect data privacy and prevent data theft. In this paper, a Hybrid Intelligent Database Security framework is proposed. The focus of the framework is to protect data privacy and prevent data theft. The proof of concept is implemented on Oracle Database. The proposed framework provides a multiple layer security, which can be used to protect data privacy and prevent data theft. The test results show that the framework is able to protect data privacy and prevent data theft. The proposed framework can be used to protect data in emerging technology like distributed databases, cloud computing etc...

  • STT-MRAM Application on IoT Data Privacy Protection System

    One of the major problem of Internet of Things (IoT) is that the limitation of the currently available technology cannot simultaneously provided the solution of lower power consumption, higher intelligence, higher security and non- volatile which are critical for IoT designing. Spin torque transfer magnetic random access memory (STT-MRAM) based on magnetic tunneling junction (MTJ), in addition to a high endurance, can also use as embedded non-volatile memory. Compared to all the existing technologies and components, STT-MRAM is more suitable for the IoT objects. Except to provide a better security of network hardware and information security STT-MRAM can also always in non-power standby mode. All IoT objects always maintain the “Instant On” state and thus battery life becomes extremely long. Therefore, this paper focuses on the development of the STT-MRAM application on IoT data privacy protection system. We design a STT-MRAM control circuit and use it to improve the efficiency of operation of IoT data privacy protection.

  • Does Industry Self-Regulation of Consumer Data Privacy Work?

    Data privacy and security have generated far less evaluative research to date about different policy interventions than many other industries. As the public, government, and industry continue to consider data privacy as a product subject to contract, transaction, and fair treatment, the need for practical assessments of privacy and security will grow. This will require the cooperation of multiple research disciplines and a demand for rigorous evaluation, regardless of whether the regulatory environment retains the status quo or shifts dramatically going forward.

  • Signal Processing Oriented Approach for Big Data Privacy

    This paper addresses the challenge of big data security by exploiting signal processing theories. We propose a new big data privacy protocol that scrambles data via artificial noise and secret transform matrices. The utility of the scrambled data is maintained, as demonstrated by a cyber-physical system application. We further outline the proof of the proposed protocol's privacy by considering the limitations of blind source separation and compressive sensing.

  • Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy

    The development of cloud computing brings convenience to our lives due to high efficiency, usability, accessibility and affordability. But the cloud data privacy faces severe challenges. Although Negative survey, which is spired by Artificial Immune System (AIS), can protect users' privacy data with high efficiency and degree of privacy protection, its accuracy is influenced by the number of client terminals, and insufficient client terminals may lead to many errors. This study focuses on a multiple-negative survey method of remedying this weakness. Compared with traditional negative survey, the multiple- negative survey method collects each user's multiple different negative categories rather than only one negative category. The accuracy is analysed and simulation experiments verify the analysis.

  • Enhanced user data privacy with pay-by-data model

    Personal data collection is becoming pervasive these days, these data has the risk of being abused by current application and application marketplace model, because only the price of application is explicitly indicated without clear agreement on usage of data, and the granularity of data access authentication is not enough to protect users privacy. In this short paper, we propose a new model of user data privacy. Data usage of the application is explicitly shown, and controlled by an authentication service, to protect users from the abuse of their data, especially in mobile application.

  • Enhancing the data privacy for public data lakes

    With the rapid development of big data technologies, the value of data are discovered in a wide spectrum of application scenarios. How to effectively share valuable data therefore becomes a design focus of data lakes, which is a popular means of data sharing. Unfortunately, the privacy issues due to data sharing remains a missing piece in the data lake designs, which become a barrier of data sharing between foreign peers that might not completely trust each other. In this paper, we propose a novel framework for public data lakes to control and protect the data privacy of data sharing. The major objective of this work is to boost the circulation of valuable data for big data analytics, and promote the development of big data technologies.

  • Hybrid Fragmentation to Preserve Data Privacy for SaaS

    SaaS is a novel software model that data and applications of service are outsourced to service provider. Although SaaS model offers many benefits for small and medium enterprises, data privacy issue is the most challenge for the development of SaaS. In this paper we propose a new hybrid fragmentation approach which is different from traditional data encryption to protect data. We define three kinds of privacy constraints to support finger-grained privacy customization. We also give a heuristic hybrid fragmentation algorithm which considers query efficiency to produce a hybrid fragmentation. We make some experiments to analyze our approach in the paper.



Standards related to Data Privacy

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Message Sets for Vehicle/Roadside Communications

Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...