scholarly journals Special issue on “security and privacy in pervasive and ubiquitous computing and communication systems”

2013 ◽  
Vol 6 (12) ◽  
pp. 1522-1523
Author(s):  
Peng Liu ◽  
Refik Molva ◽  
Jiwu Jing
2014 ◽  
Vol 39 ◽  
pp. 1-2 ◽  
Author(s):  
Ahmed Al-Dubi ◽  
Shoukat Ali ◽  
Lei Liu ◽  
Dakai Zhu

2021 ◽  
Vol 7 (2) ◽  
pp. 245-246
Author(s):  
Weizhi Meng ◽  
Daniel Xiapu Luo ◽  
Chunhua Su ◽  
Debiao He ◽  
Marios Anagnostopoulos ◽  
...  

2015 ◽  
pp. 1564-1580
Author(s):  
Theodosios Tsiakis

The preponderant dilemma organisations confront currently is which way to homologate and superintend access for a broad mass of services and products and in parallel to preserve security and privacy. Information technology is rapidly changing, is inherently complex, and complexity kills security. There is an ongoing technical race to maintain security that does not take into account the human factors. The new technological infrastructure affects the degree of anonymity and confidentiality in mass-market computer-based systems and basically determines the evolution of democratic-political culture. Thus, in examining the issue of security, cryptography, privacy in the use of computers and Internet, forms the primary interest form the moral side of view, about what is the right and wrong thing to do, rather than in a legal frame, about what is legal and illegal. Security and privacy are not ethical or moral issues. They are fundamental human rights. In this societal change, the challenges of the information society are many but foremost is the protection of human rights. Addressing the critical question of how technological trends are both helping and hindering the advancement of human rights is essential in the specific digital environment. The democratic key concept is the efficient use of digital resources. We do not only need a culture of security (information), we further need to ensure the security of cultures, meaning that everyone should be able to freely exercise their constitutional rights. The role of this chapter is to bring to the surface the rights (human) implications of ICT and the information society. It enlightens the technical community, which designs, implements, and secures information and communication systems, with an understanding of human rights principles and foundational underpinnings. It highlights the role of government implications, identifies the role and relationship between the stakeholders, and indicates the balance between information security and freedom in order to understand that security, freedom, and rights (human), are not opposite concepts but coexist and progress in parallel.


Author(s):  
S. R. Mani Sekhar ◽  
Sharmitha S. Bysani ◽  
Vasireddy Prabha Kiranmai

Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.


Sign in / Sign up

Export Citation Format

Share Document