Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications

2017 ◽  
pp. 19-44
Author(s):  
Mamadou H. Diallo ◽  
Michael August ◽  
Roger Hallman ◽  
Megan Kline ◽  
Henry Au ◽  
...  
2007 ◽  
Vol 23 (4) ◽  
pp. 248-257 ◽  
Author(s):  
Matthias R. Mehl ◽  
Shannon E. Holleran

Abstract. In this article, the authors provide an empirical analysis of the obtrusiveness of and participants' compliance with a relatively new psychological ambulatory assessment method, called the electronically activated recorder or EAR. The EAR is a modified portable audio-recorder that periodically records snippets of ambient sounds from participants' daily environments. In tracking moment-to-moment ambient sounds, the EAR yields an acoustic log of a person's day as it unfolds. As a naturalistic observation sampling method, it provides an observer's account of daily life and is optimized for the assessment of audible aspects of participants' naturally-occurring social behaviors and interactions. Measures of self-reported and behaviorally-assessed EAR obtrusiveness and compliance were analyzed in two samples. After an initial 2-h period of relative obtrusiveness, participants habituated to wearing the EAR and perceived it as fairly unobtrusive both in a short-term (2 days, N = 96) and a longer-term (10-11 days, N = 11) monitoring. Compliance with the method was high both during the short-term and longer-term monitoring. Somewhat reduced compliance was identified over the weekend; this effect appears to be specific to student populations. Important privacy and data confidentiality considerations around the EAR method are discussed.


2006 ◽  
Author(s):  
Ayse P. Gurses ◽  
Yan Xiao ◽  
Paul Gorman ◽  
Brian Hazlehurst ◽  
Grant Bochicchio ◽  
...  

2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Poornima M. Chanal ◽  
Mahabaleshwar S. Kakkasageri

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


Sign in / Sign up

Export Citation Format

Share Document