17,496 resources related to Data Security
- Topics related to Data Security
- IEEE Organizations related to Data Security
- Conferences related to Data Security
- Periodicals related to Data Security
- Most published Xplore authors for Data Security
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
Promote the exchange of ideas between academia and industry in the field of computer and networks dependability
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids), 2017
Along with the growing popularisation of Cloud Computing. Cloud storage technology has been paid more and more attention as an emerging network storage technology which is extended and developed by cloud computing concepts. Cloud computing environment depends on user services such as high- speed storage and retrieval provided by cloud computing system. Meanwhile, data security is an important problem to ...
2017 Chinese Automation Congress (CAC), 2017
Interactive Electrical Technical Manual relates to weapon equipment's core data. Guarantee Interactive Electrical Technical Manual data security has significant stratagem. According to its use, management and security requirements, this paper analyses data characteristic of Interactive Electrical Technical Manual and puts forward equipment structure based Interactive Electrical Technical Manual data model and data security management and control requirements. Aimed at Interactive ...
2013 Ninth International Conference on Computational Intelligence and Security, 2013
Public cloud data security in cloud computing is due to the data stored in the cloud. It's in a low cost and high efficiency, also bring the data the possibility of abuse. Therefore, in this paper, researching the model respond to threats based on the analysis of threats to public cloud factors, and puts forward the user management, data security, ...
2013 Fifth International Conference on Advanced Computing (ICoAC), 2013
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as ...
2012 7th International Conference on Computer Science & Education (ICCSE), 2012
The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive ...
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy - IEEE SecDev 2016
Big Data & the Cloud: Privacy and Security issues
Bill Woodward presents NEEDLES: 2016 End to End Trust and Security Workshop for the Internet of Things
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Q&A with Dr. Ling Liu: IEEE Big Data Podcast, Episode 8
Panel: Precision Health & Big Data Analytics - IEEE EMBS at NIH, 2019
Evolution of Cyber-Physical Security - Jonathan Smith - IEEE Sarnoff Symposium, 2019
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Deep Graph Learning: Techniques and Applications - Haifeng Chen - IEEE Sarnoff Symposium, 2019
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Brainstorming Key Issues for Breakout Sessions: ETAP Forum, February 2016
The Role of Data Analytics in AI - Nick Saunders - VIC Summit 2019
Edge To Core To Cloud IoT infrastructure For Distributed Analytics - Yogev Shimony and Phil Hummel, Fog World Congress 2017
Q&A with Dr. Atilla Elci: IEEE Big Data Podcast, Episode 10
Keynote Isaac Ben-Israel - ETAP Forum Tel Aviv 2016
Kiana Pitch: Fog Tank - Fog World Congress
Raffaele Giaffreda: Solving IoT Interoperability and Security Problems in an eHealth Context: WF-IoT 2016
Along with the growing popularisation of Cloud Computing. Cloud storage technology has been paid more and more attention as an emerging network storage technology which is extended and developed by cloud computing concepts. Cloud computing environment depends on user services such as high- speed storage and retrieval provided by cloud computing system. Meanwhile, data security is an important problem to solve urgently for cloud storage technology. In recent years, There are more and more malicious attacks on cloud storage systems, and cloud storage system of data leaking also frequently occurred. Cloud storage security concerns the user's data security. The purpose of this paper is to achieve data security of cloud storage and to formulate corresponding cloud storage security policy. Those were combined with the results of existing academic research by analyzing the security risks of user data in cloud storage and approach a subject of the relevant security technology, which based on the structural characteristics of cloud storage system.
Interactive Electrical Technical Manual relates to weapon equipment's core data. Guarantee Interactive Electrical Technical Manual data security has significant stratagem. According to its use, management and security requirements, this paper analyses data characteristic of Interactive Electrical Technical Manual and puts forward equipment structure based Interactive Electrical Technical Manual data model and data security management and control requirements. Aimed at Interactive Electrical Technical Manual data security management and control requirements, brings forward equipment structure based Interactive Electrical Technical Manual data security management and control model. The model includes data confidentiality, data integrity, data usability and data reliability. According to Interactive Electrical Technical Manual data security management and control requirements and model, design equipment structure based Interactive Electrical Technical Manual data security management and control. Java and Web Service technology are used to implement components of data security management and control software, which are integrated with Interactive Electrical Technical Manual browsing and operation function to realize multilevel and fine grain Interactive Electrical Technical Manual data security management and control.
Public cloud data security in cloud computing is due to the data stored in the cloud. It's in a low cost and high efficiency, also bring the data the possibility of abuse. Therefore, in this paper, researching the model respond to threats based on the analysis of threats to public cloud factors, and puts forward the user management, data security, data center hardware and software security and control transfer to strengthen the data security of the public cloud. And to find the balance between risk and business mission.
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider such as Samsung Android smart phones with DropBox storage. On the other hand, Apple iPhone and Windows Phone has their own cloud data storage such as iCloud and SkyDrive respectively. However, mobile phone cloud application users are hesitant to move their data from their mobile phone to the cloud service provider because of increasing data security and privacy concern. In this paper, a mobile data security encryption model is proposed to encounter this problem. With the technical advancement in the mobile and cloud computing, an encryption algorithm is designed known as Ghost, Geometric Host for Mobile Data Security.
The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive information filtering, cloud computing security gateway strategy and management to protect such as the security management, rules and regulations, safety education.
As an increasing number of intellectual property (IP) infringements have been done through internet, to strengthen the IP enforcement rules in the digital environment is increasingly becoming a national consensus. The Anti- Counterfeiting Trade Agreement (ACTA), in keeping with this trend, launched a strong set of rules, but caused considerable controversy due to its specific measures that may infringe the data security. This article attempts to examine the IP enforcement rules in the digital environment from the perspective of data security. After making an overview of the IP enforcement rules in the digital environment, this article further analyses the problems in the data security that arises from this set of rules. On this basis, this article combs the legislative status quo of China, and discusses how to keep coordination in the future between strengthening the IP enforcement rules in the digital environment and the data security, and puts forward specific recommendations.
For characteristics of Marine scientific data, such as multi-source, massive data and network centralized management, studies on data security become a central problem. A common practice in controlling access to sensitive data is Role-Based Access Control (RBAC). Current RBAC researches focus on developing new models or enhancing existing models. In our research, we developed an RBAC model using Flex and C# as the target language, which can provide flexibility to the marine data management. Focusing on data security, the paper gives the layer architecture and the model design of security access management for specification. The paper also presents the detailed methods to achieve data security by the technologies of identifying validation, verifying codes, access control, preventing illegal users and database security by oracle parameters and storage procedures. Additionally, we have conducted an empirical study to evaluate its usefulness and effectiveness. All the methods adopted in this paper can be applied in data management of various systems.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Big data presents a tremendous opportunity for enterprises across industries. Without the right security and encryption solution in place, however, big data can mean big problems. To find a solution to this problem we propose a model with the ability to trace and prevent unauthorised users from accessing the cluster again. We make use of the LD (Leakage Detector) algorithm during this process to identify the guilt agent responsible for data leakage. We also introduce a Logger which helps to provide unique id to each user and keep a track of the activities performed by them during the whole session. This model will ultimately improve the existing security issues related to data security in Hadoop framework.
The most of the organizations tend to accumulate the data related to security, which goes up-to terabytes in every month. They collect this data to meet the security requirements. The data is mostly in the shape of logs like Dns logs, Pcap files, and Firewall data etc. The data can be related to any communication network like cloud, telecom, or smart grid network. Generally, these logs are stored in databases or warehouses which becomes ultimately gigantic in size. Such a huge size of data upsurge the importance of security analytics in big data. In surveys, the security experts grumble about the existing tools and recommend for special tools and methods for big data security analysis. In this paper, we are using a big data analysis tool, which is known as apache spark. Although this tool is used for general purpose but we have used this for security analysis. It offers a very good library for machine learning algorithms including the clustering which is the main algorithm used in our work. In this work, we have developed a novel model, which combines rule based and clustering analysis for security analysis of big dataset. The dataset we are using in our experiment is the Kddcup99 which is a widely used dataset for intrusion detection. It is of MBs in size but can be used as a test case for big data security analysis.
Data security is one of the major concerns in today's scenario. However, due to availability of information related to networks and free software, hackers can easily hack into different computers without even having much in-depth knowledge of the network architecture. It is very hard to protect our valuable data from others and it is impossible to restrict hackers by installing firewalls and other security software. As software is always having some kind of weak points, which can be exploited by technically equipped people, The solution to this problem is by securing the hardware. In hardwired security, we are proposing a hardware control unit attached with motherboard, due to which we can give permission to different users of that computer according to access rights. The users are identified using smart-metric finger print identification algorithm, it require multiple fingerprints in authentication which prevents the re-use of the fingerprint. It also decreases the probability of successful reproduction of phony fingers which will provide a new level of data security.
This project establishes a standard for wireless communication methods and data format for transducers (sensors and actuators). The standard defines a TEDS based on the IEEE 1451 concept and protocols to access TEDS and transducer data. It adopts necessary wireless interfaces and protocols to facilitate the use of technically differentiated, existing wireless technology solutions. It does not specify transducer design, ...
This project develops a set of common functionality for the family of IEEE 1451 smart transducer interface standards. This functionality is independent of the physical communications media. It includes the basic functions required to control and manage smart transducers, common communications protocols, and media-independent TEDS formats. It defines a set of implementation-independent APIs. This project does not specify signal conditioning ...
This project will develop a standard thqt defines a digital interface for connecting multiple physically separated transducers. It will leverage off the IEEE P1451.1 and IEEE P1451.2 standards. The standard will define the TEDS format, the electrical interface, channel identification protocols, hot swap protocols, time synchronization protocols, and the read and write logic functions used to access the TEDS and ...
This project will establish a standard interface for connecting network capable processors to control networks through the development of a common control network information or object model for smart sensors and actuators. The object model includes transducer block, function block, plysical block, and network block and their underlying structures. This project will not define individual device algorithms or specifics of ...
This project will develop a standard digital interface for connecting transducers (defined here as sensors and actuators) to microprocessors. It will define a transducer electronic data sheet (TEDS) and its data formats. It will define an electrical interface, read and write logic functions to access the TEDS and transducers. This interface will be usable by a wide variety of sensors ...