Internet of Things–New security and privacy challenges
RH Weber - Computer law & security review, 2010 - Elsevier
… security and privacy of the involved stakeholders. Measures ensuring the architecture's
resilience to attacks, data authentication, access control and client privacy … IT-security-legislation, …
resilience to attacks, data authentication, access control and client privacy … IT-security-legislation, …
Big data analytics: Security and privacy challenges
Y Gahi, M Guennoun… - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
… and varied data could lead to many security and privacy violations. In this paper, we have
highlighted a set of security and privacy challenges that should be considered by big data tools…
highlighted a set of security and privacy challenges that should be considered by big data tools…
Security and privacy challenges in cloud computing environments
… This article illustrates the unique issues of cloud computing that exacerbate security and
privacy challenges in clouds.We also discuss various approaches to address these challenges …
privacy challenges in clouds.We also discuss various approaches to address these challenges …
Security and privacy challenges in smart cities
… following five questions regarding potential privacy and security challenges in a smart city. …
smart city security and privacy challenges. How do we ensure personal privacy throughout a …
smart city security and privacy challenges. How do we ensure personal privacy throughout a …
Security and privacy in smart cities: Challenges and opportunities
… cities with respect to security and privacy to provide an overview of … Then, we discuss the
privacy and security issues in current … Finally, we present open research challenges and identify …
privacy and security issues in current … Finally, we present open research challenges and identify …
IoT Privacy and security: Challenges and solutions
… , advantages, and challenges, or the possible security risks or … followed by IoT security and
privacy challenges. In Section 4, … and stretched with the privacy and security components and …
privacy challenges. In Section 4, … and stretched with the privacy and security components and …
Privacy and security for online social networks: challenges and opportunities
… privacy and security concerns. In this article we discuss the design issues for the security and
privacy … We present the unique security and privacy design challenges brought by the core …
privacy … We present the unique security and privacy design challenges brought by the core …
Security and privacy in cloud computing: vision, trends, and challenges
… , and provable security still have issues that need to be properly addressed. This article
explores the various challenges, existing solutions, and limitations of cloud security, with a focus …
explores the various challenges, existing solutions, and limitations of cloud security, with a focus …
Security and privacy challenges in internet of things
MS Virat, SM Bindu, B Aishwarya… - … on Trends in …, 2018 - ieeexplore.ieee.org
… Hence this paper further highlights the key privacy challenges and the security challenges
with respect to layers of IoT architecture, which must be considered for the development of IoT…
with respect to layers of IoT architecture, which must be considered for the development of IoT…
Privacy and security challenges in internet of things
ML Das - Distributed Computing and Internet Technology: 11th …, 2015 - Springer
… Security and privacy … security and privacy challenges in IoT scenarios and applications
with special emphasis on resource-constrained environments’ security objectives and privacy …
with special emphasis on resource-constrained environments’ security objectives and privacy …
相关搜索
- data analytics security and privacy challenges
- smart cities security and privacy challenges
- cloud computing security and privacy challenges
- big data security and privacy
- internet of things security and privacy
- security privacy and trust issues
- security and privacy framework
- security and privacy issues detail study
- safety security and privacy
- smart city applications security and privacy
- sensitive data security and privacy
- privacy and security online social networks
- challenges of privacy protection
- survey on security challenges
- systematic literature review security and privacy
- cyber security challenges