共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2008,96(10):1688-1697
3.
An Introduction to Distributed Smart Cameras 总被引:2,自引:0,他引:2
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2008,96(10):1565-1575
4.
5.
Security and Privacy for Distributed Multimedia Sensor Networks 总被引:1,自引:0,他引:1
Kundur D. Luh W. Okorafor U.N. Zourntos T. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2008,96(1):112-130
There is a critical need to provide privacy and security assurances for distributed multimedia sensor networking in applications including military surveillance and healthcare monitoring. Such guarantees enable the widespread adoption of such information systems, leading to large-scale societal benefit. To effectively address protection and reliability issues, secure communications and processing must be considered from system inception. Due to the emerging nature of broadband sensor systems, this provides fertile research ground for proposing more paradigm-shifting approaches. This paper discusses issues in designing for security and privacy in distributed multimedia sensor networks. We introduce the heterogeneous lightweight sensornets for trusted visual computing framework for distributed multimedia sensor networks. Protection issues within this architecture are analyzed, leading to the development of open research problems including secure routing in emerging free-space optical sensor networks and distributed privacy for vision-rich sensor networking. Proposed solutions to these problems are presented, demonstrating the necessary interaction among signal processing, networking, and cryptography. 相似文献
6.
7.
Sherali Zeadally Al-Sakib Khan Pathan Cristina Alcaraz Mohamad Badra 《Wireless Personal Communications》2013,73(1):23-50
The smart grid is an electronically controlled electrical grid that connects power generation, transmission, distribution, and consumers using information communication technologies. One of the key characteristics of the smart grid is its support for bi-directional information flow between the consumer of electricity and the utility provider. This two-way interaction allows electricity to be generated in real-time based on consumers’ demands and power requests. As a result, consumer privacy becomes an important concern when collecting energy usage data with the deployment and adoption of smart grid technologies. To protect such sensitive information it is imperative that privacy protection mechanisms be used to protect the privacy of smart grid users. We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity. 相似文献
8.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2008,96(10):1606-1624
9.
10.
Ye Liang Yan Susu Zhen Jialing Han Tian Ferdinando Hany Seppänen Tapio Alasaarela Esko 《Mobile Networks and Applications》2022,27(4):1688-1699
Mobile Networks and Applications - In recent years, physical violence detection has become a research hotspot in the area of human activity recognition. With the improvement and full coverage of... 相似文献
11.
12.
《无线互联科技》2016,(9)
随着社会的不断进步与信息化发展,数据库管理已经成为人类生活的重要组成部分,不仅方便了人们的生活,让繁杂的众多信息得到整理与管理。这不仅标志着人类走入信息华的网络时代,还标志着人类的文化的发展有更新的拓宽性发展。在进行数据库的管理中,越来越多的人开始注意数据管理的安全性与隐私保护等问题,这给数据库管的发展带来了助推的作用,在所有人类创造的事物中,无不都是为供应人们的生活的方便而创立出来的。而数据库的形式正是由于人们的需求而建立的,再由人们对其提出的宝贵意见或建议来推动信息化数据库的发展。从而使得人类更加进步。文章通过数据库的介绍以及基本的知识储备后,对数据库所存在的问题进行整理与归纳,然后进行分析根据分析提出合理化建议。 相似文献
13.
徐俊 《信息安全与通信保密》2010,(9):52-53
蓝盾内网安全保密系统(BD-SECSYS)是由蓝盾信息安全技术股份有限公司自主研发的基于内网安全和防信息泄漏的内网安全集成系统。蓝盾信息安全技术股份有限公司基于多年积累的安全产品研发和实施经验,集中强大的研发队伍,推出了具有完善功能、稳定可靠和出色性能的内网安全集成产品。 相似文献
14.
15.
16.
ENUM的安全性和隐私保护问题探讨 总被引:1,自引:0,他引:1
电子号码(ENUM)是因特网工程任务组(IETF)中“电话号码映射”工作组提出的一项网络新技术,它把符合E.164标准的电话号码作为用户通信的入口,采用域名服务(DNS)技术和运行框架提供基于电话号码的通用目录服务。DNS是一种开放系统,给ENUM的安全性和隐私保护带来隐患。文中简要介绍ENUM技术及其发展现状,着重分析和探讨了ENUM中存在的安全性和隐私保护问题,并对ENUM中所用的安全协议做了比较。 相似文献
17.
18.
《信息安全与通信保密》2010,(12):55-55
随着信息技术在涉密单位的广泛应用,在提高工作效率的同时,也带来了许多"保密安全"问题,计算机信息防泄密问题愈加突出。目前从上级单位通报转发的泄密事件来看,发生在互联网这个出口的不在少数,当事责任人违规或主观疏忽是主要原因。 相似文献
19.
首先把基于RFID的信息分为三个安全域,然后分别阐述发生在这几个域的攻击方式,最后针对这些攻击方式,提出了一个协同工作模型来对RFID系统的安全进行防护. 相似文献
20.
de Fuentes Jose M. Gonzalez-Manzano Lorena Lopez Javier Peris-Lopez Pedro Choo Kim-Kwang Raymond 《Mobile Networks and Applications》2019,24(3):878-880
Mobile Networks and Applications - 相似文献