Conferences related to Data Security

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2019 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


GLOBECOM 2019 - 2019 IEEE Global Communications Conference

Provides a full program of technical and professional activities spanning hot topics in voice, data, image and multimedia communications and networking.


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


IEEE INFOCOM 2019 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative research contributions to the field of computer and data communication networks. We invite submissions on a wide range of research topics, spanning both theoretical and systems research.


More Conferences

Periodicals related to Data Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Data Security

Back to Top

Xplore Articles related to Data Security

Back to Top

Study on Data Security Policy Based on Cloud Storage

2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids), 2017

Along with the growing popularisation of Cloud Computing. Cloud storage technology has been paid more and more attention as an emerging network storage technology which is extended and developed by cloud computing concepts. Cloud computing environment depends on user services such as high- speed storage and retrieval provided by cloud computing system. Meanwhile, data security is an important problem to ...


Research on equipment structure based IETM data security management and control

2017 Chinese Automation Congress (CAC), 2017

Interactive Electrical Technical Manual relates to weapon equipment's core data. Guarantee Interactive Electrical Technical Manual data security has significant stratagem. According to its use, management and security requirements, this paper analyses data characteristic of Interactive Electrical Technical Manual and puts forward equipment structure based Interactive Electrical Technical Manual data model and data security management and control requirements. Aimed at Interactive ...


The Design Research of Data Security Model Based on Public Cloud

2013 Ninth International Conference on Computational Intelligence and Security, 2013

Public cloud data security in cloud computing is due to the data stored in the cloud. It's in a low cost and high efficiency, also bring the data the possibility of abuse. Therefore, in this paper, researching the model respond to threats based on the analysis of threats to public cloud factors, and puts forward the user management, data security, ...


Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider

2013 Fifth International Conference on Advanced Computing (ICoAC), 2013

Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as ...


Data security policy in the cloud computing

2012 7th International Conference on Computer Science & Education (ICCSE), 2012

The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive ...


More Xplore Articles

Educational Resources on Data Security

Back to Top

IEEE.tv Videos

Daniel Engels: Security in IoT Begins With Data - Industry Forum Panel: WF IoT 2016
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy - IEEE SecDev 2016
Big Data & the Cloud: Privacy and Security issues
Bill Woodward presents NEEDLES: 2016 End to End Trust and Security Workshop for the Internet of Things
Q&A with Dr. Ling Liu: IEEE Big Data Podcast, Episode 8
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Brainstorming Key Issues for Breakout Sessions: ETAP Forum, February 2016
Q&A with Dr. Atilla Elci: IEEE Big Data Podcast, Episode 10
Keynote Isaac Ben-Israel - ETAP Forum Tel Aviv 2016
Edge To Core To Cloud IoT infrastructure For Distributed Analytics - Yogev Shimony and Phil Hummel, Fog World Congress 2017
Raffaele Giaffreda: Solving IoT Interoperability and Security Problems in an eHealth Context: WF-IoT 2016
Cybersecurity Panel: 2016 Technology Time Machine
Kiana Pitch: Fog Tank - Fog World Congress
IEEE Green Energy Summit 2015: Closing Remarks
Speaker Jessica Groopman - ETAP San Jose 2015
IEEE @ SXSW 2015 - Biometrics & Identity: Beyond Wearable

IEEE-USA E-Books

  • Study on Data Security Policy Based on Cloud Storage

    Along with the growing popularisation of Cloud Computing. Cloud storage technology has been paid more and more attention as an emerging network storage technology which is extended and developed by cloud computing concepts. Cloud computing environment depends on user services such as high- speed storage and retrieval provided by cloud computing system. Meanwhile, data security is an important problem to solve urgently for cloud storage technology. In recent years, There are more and more malicious attacks on cloud storage systems, and cloud storage system of data leaking also frequently occurred. Cloud storage security concerns the user's data security. The purpose of this paper is to achieve data security of cloud storage and to formulate corresponding cloud storage security policy. Those were combined with the results of existing academic research by analyzing the security risks of user data in cloud storage and approach a subject of the relevant security technology, which based on the structural characteristics of cloud storage system.

  • Research on equipment structure based IETM data security management and control

    Interactive Electrical Technical Manual relates to weapon equipment's core data. Guarantee Interactive Electrical Technical Manual data security has significant stratagem. According to its use, management and security requirements, this paper analyses data characteristic of Interactive Electrical Technical Manual and puts forward equipment structure based Interactive Electrical Technical Manual data model and data security management and control requirements. Aimed at Interactive Electrical Technical Manual data security management and control requirements, brings forward equipment structure based Interactive Electrical Technical Manual data security management and control model. The model includes data confidentiality, data integrity, data usability and data reliability. According to Interactive Electrical Technical Manual data security management and control requirements and model, design equipment structure based Interactive Electrical Technical Manual data security management and control. Java and Web Service technology are used to implement components of data security management and control software, which are integrated with Interactive Electrical Technical Manual browsing and operation function to realize multilevel and fine grain Interactive Electrical Technical Manual data security management and control.

  • The Design Research of Data Security Model Based on Public Cloud

    Public cloud data security in cloud computing is due to the data stored in the cloud. It's in a low cost and high efficiency, also bring the data the possibility of abuse. Therefore, in this paper, researching the model respond to threats based on the analysis of threats to public cloud factors, and puts forward the user management, data security, data center hardware and software security and control transfer to strengthen the data security of the public cloud. And to find the balance between risk and business mission.

  • Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider

    Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.

  • Data security policy in the cloud computing

    The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive information filtering, cloud computing security gateway strategy and management to protect such as the security management, rules and regulations, safety education.

  • Coordination between the Intellectual Property Enforcement in the Digital Environment and the Data Security

    As an increasing number of intellectual property (IP) infringements have been done through internet, to strengthen the IP enforcement rules in the digital environment is increasingly becoming a national consensus. The Anti- Counterfeiting Trade Agreement (ACTA), in keeping with this trend, launched a strong set of rules, but caused considerable controversy due to its specific measures that may infringe the data security. This article attempts to examine the IP enforcement rules in the digital environment from the perspective of data security. After making an overview of the IP enforcement rules in the digital environment, this article further analyses the problems in the data security that arises from this set of rules. On this basis, this article combs the legislative status quo of China, and discusses how to keep coordination in the future between strengthening the IP enforcement rules in the digital environment and the data security, and puts forward specific recommendations.

  • Model Design of Role-Based Access Control and Methods of Data Security

    For characteristics of Marine scientific data, such as multi-source, massive data and network centralized management, studies on data security become a central problem. A common practice in controlling access to sensitive data is Role-Based Access Control (RBAC). Current RBAC researches focus on developing new models or enhancing existing models. In our research, we developed an RBAC model using Flex and C# as the target language, which can provide flexibility to the marine data management. Focusing on data security, the paper gives the layer architecture and the model design of security access management for specification. The paper also presents the detailed methods to achieve data security by the technologies of identifying validation, verifying codes, access control, preventing illegal users and database security by oracle parameters and storage procedures. Additionally, we have conducted an empirical study to evaluate its usefulness and effectiveness. All the methods adopted in this paper can be applied in data management of various systems.

  • An enhanced model for preventing guilt agents and providing data security in distributed environment

    Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Big data presents a tremendous opportunity for enterprises across industries. Without the right security and encryption solution in place, however, big data can mean big problems. To find a solution to this problem we propose a model with the ability to trace and prevent unauthorised users from accessing the cluster again. We make use of the LD (Leakage Detector) algorithm during this process to identify the guilt agent responsible for data leakage. We also introduce a Logger which helps to provide unique id to each user and keep a track of the activities performed by them during the whole session. This model will ultimately improve the existing security issues related to data security in Hadoop framework.

  • Hybrid model of rule based and clustering analysis for big data security

    The most of the organizations tend to accumulate the data related to security, which goes up-to terabytes in every month. They collect this data to meet the security requirements. The data is mostly in the shape of logs like Dns logs, Pcap files, and Firewall data etc. The data can be related to any communication network like cloud, telecom, or smart grid network. Generally, these logs are stored in databases or warehouses which becomes ultimately gigantic in size. Such a huge size of data upsurge the importance of security analytics in big data. In surveys, the security experts grumble about the existing tools and recommend for special tools and methods for big data security analysis. In this paper, we are using a big data analysis tool, which is known as apache spark. Although this tool is used for general purpose but we have used this for security analysis. It offers a very good library for machine learning algorithms including the clustering which is the main algorithm used in our work. In this work, we have developed a novel model, which combines rule based and clustering analysis for security analysis of big dataset. The dataset we are using in our experiment is the Kddcup99 which is a widely used dataset for intrusion detection. It is of MBs in size but can be used as a test case for big data security analysis.

  • Hardwired data security using smart-metric algorithm

    Data security is one of the major concerns in today's scenario. However, due to availability of information related to networks and free software, hackers can easily hack into different computers without even having much in-depth knowledge of the network architecture. It is very hard to protect our valuable data from others and it is impossible to restrict hackers by installing firewalls and other security software. As software is always having some kind of weak points, which can be exploited by technically equipped people, The solution to this problem is by securing the hardware. In hardwired security, we are proposing a hardware control unit attached with motherboard, due to which we can give permission to different users of that computer according to access rights. The users are identified using smart-metric finger print identification algorithm, it require multiple fingerprints in authentication which prevents the re-use of the fingerprint. It also decreases the probability of successful reproduction of phony fingers which will provide a new level of data security.



Standards related to Data Security

Back to Top

IEEE Standard for a Smart Transducer Interface for Sensors and Actuator -- Wireless Communication Protocols and Transducer Electronic Data Sheet (TEDS) Formats

This project establishes a standard for wireless communication methods and data format for transducers (sensors and actuators). The standard defines a TEDS based on the IEEE 1451 concept and protocols to access TEDS and transducer data. It adopts necessary wireless interfaces and protocols to facilitate the use of technically differentiated, existing wireless technology solutions. It does not specify transducer design, ...


IEEE Standard for a Smart Transducer Interface for Sensors and Actuators - Common Functions, Communication Protocols, and Transducer Electronic Data Sheet (TEDS) Formats

This project develops a set of common functionality for the family of IEEE 1451 smart transducer interface standards. This functionality is independent of the physical communications media. It includes the basic functions required to control and manage smart transducers, common communications protocols, and media-independent TEDS formats. It defines a set of implementation-independent APIs. This project does not specify signal conditioning ...


IEEE Standard for a Smart Transducer Interface for Sensors and Actuators - Digital Communication and Transducer Electronic Data Sheet (TEDS) Formats for Distributed Multidrop Systems

This project will develop a standard thqt defines a digital interface for connecting multiple physically separated transducers. It will leverage off the IEEE P1451.1 and IEEE P1451.2 standards. The standard will define the TEDS format, the electrical interface, channel identification protocols, hot swap protocols, time synchronization protocols, and the read and write logic functions used to access the TEDS and ...


IEEE Standard for a Smart Transducer Interface for Sensors and Actuators - Network Capable Application Processor Information Model

This project will establish a standard interface for connecting network capable processors to control networks through the development of a common control network information or object model for smart sensors and actuators. The object model includes transducer block, function block, plysical block, and network block and their underlying structures. This project will not define individual device algorithms or specifics of ...


IEEE Standard for a Smart Transducer Interface for Sensors and Actuators - Transducer to Microprocessor Communication Protocols and Transducer Electronic Data Sheet (TEDS) Formats

This project will develop a standard digital interface for connecting transducers (defined here as sensors and actuators) to microprocessors. It will define a transducer electronic data sheet (TEDS) and its data formats. It will define an electrical interface, read and write logic functions to access the TEDS and transducers. This interface will be usable by a wide variety of sensors ...


More Standards