Browse Results

Showing 57,376 through 57,400 of 60,741 results

Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings (Lecture Notes in Computer Science #12395)

by Stefanos Gritzalis Edgar R. Weippl Gabriele Kotsis A Min Tjoa Ismail Khalil

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.

Trust, Privacy and Security in Digital Business: 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings (Lecture Notes in Computer Science #13582)

by Sokratis Katsikas Steven Furnell

This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection; Honeypots; Homomorphic encryption;, and Serious games.

Trust, Privacy and Security in Digital Business

by Sokratis Katsikas Costas Lambrinoudakis Steven Furnell

This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic m- ketplace. Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the - tent to which 'information security' and 'user privacy' can be ensured. TrustBus 2009 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Linz to participate and debate the new emerging advances in this area.

Trust, Privacy and Security in Digital Business

by Costas Lambrinoudakis Javier Lopez Simone Fischer-Hübner

This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic m- ketplace. Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the - tent to which 'information security' and 'user privacy' can be ensured. TrustBus 2009 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Linz to participate and debate the new emerging advances in this area.

Trust, Security and Privacy for Big Data

by Mamoun Alazab

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the ethos of Big Data which is volume, velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful, scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT, manufacturing, smart cars, power grids etc., but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges, such as generative adversary networks, efficient encryption and decryption algorithms, encrypted information retrieval, attribute-based encryption, attacks on availability, and reliability. Providing security and privacy for big data storage, transmission, and processing have been attracting much attention in all big data related areas.The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers, academicians, students, and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT, cyber physical domains, big data architectures, studies for trustworthy computing, and approaches for distributed systems and big data security solutions etc.

Trust, Social Relations and Engagement

by Donatella Padua

In the Internet Age, horizontal value chains generated by peer-to-peer relationships have to be integrated in economic vertical processes. This means that all institutions, from the economical to the political, to the cultural or technological have to turn their approach into a 'social' one. This doesn't mean embracing a no-profit perspective: indeed it implies designing new trust and engagement strategies to generate positive win-win situations with stakeholders. Through the tools offered by sociology, a specific indication on how to build and measure value out of these strategies is offered by the 'Value for Engagement Model'. Behind the model, the innovative concept of Value for Engagement allows the definition of focused strategies to build value through achieving the stakeholders' commitment and activating emotional ties to the organisation. In this new role of 'pulling' stakeholders, the prerequisite is to be perceived as trustworthy.

Trust Your Mind: Embracing Nuance in a World of Self-Silencing

by Jenara Nerenberg

An urgent examination of self-silencing culture and the toxic impact of groupthink, by the author of Divergent Mind and founder of The Neurodiversity Project. Nerenberg empowers readers with tools to understand the mind and navigate an increasingly polarized world, from campuses and workplaces, to the media and beyond.Connected across geography and culture via the internet, the world is both a vast, limitless landscape and an ever-shrinking echo chamber. Communication, especially discourse over free speech, is becoming increasingly divisive; one person’s right to speak comes into conflict with another seeking to prevent harm. Our tolerance for differing opinions is also narrowing. A “wrong” remark or comment, no matter how seemingly innocent, can result in banishment, and contradictory ideas spark hysteria and backlash—what is referred to as “cancel culture.” This polarization affects everyone of us—among friends and families, workplaces and communities—and threatens the fabric of society.In this timely book, Jenara Nerenberg analyzes this phenomenon of “self-silencing,” asking potent questions about how harmful groupthink has become accepted. Applying her expertise in journalism, psychology, and public health, she digs deep into urgent problems that are worsening under a culture of self-censorship, including loneliness, isolation, and polarization.But there is hope. Nerenberg offers insights for how to identify and escape groupthink and transform fear into empathy, allowing space for authentic communication that reduces—rather than causes—harm to others.

Trusted Cellular IoT Devices: Design Ingredients and Concepts (Synthesis Lectures on Engineering, Science, and Technology)

by Kersten Heins

This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.

Trusted Computing and Information Security: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Communications in Computer and Information Science #960)

by Huanguo Zhang Bo Zhao Fei Yan

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers (Communications in Computer and Information Science #1149)

by Liehuang Zhu Fei Yan Weili Han

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.

Trusted Computing for Embedded Systems

by Bernard Candaele Dimitrios Soudris Iraklis Anagnostopoulos

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. · Enables readers to address a variety of security threats to embedded hardware and software; · Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; · Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

Trusted Computing Platforms

by Graeme Proudler Liqun Chen Chris Dalton

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Trusted Data, revised and expanded edition: A New Framework for Identity and Data Sharing

by Thomas Hardjono David L. Shrier Alex Pentland

How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted.ContributorsMichiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy ZyskindAn MIT Connection Science and Engineering Book

Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention And Detection

by Hassan Salmani

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Trusted Execution Environments

by Konstantinos Markantonakis Carlton Shepherd

Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.

Trusted Systems

by Moti Yung Jianbiao Zhang Zhen Yang

This book constitutes the thoroughly refereedpost-conference proceedings of the 7th International Conference on TrustedSystems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have beencarefully reviewed and selected from 29 submissions. They are devoted to allaspects of trusted computing systems, including trusted modules, platforms;networks, services and applications. The papers are organized in the followingsections: encryptions and signatures; security model; trusted technologies;software and system security.

Trusted Systems

by Moti Yung Liehuang Zhu Yanjiang Yang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies. /* Style Definitions */ table. MsoNormalTable {{mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5. 4pt 0in 5. 4pt; mso-para-margin:0in; mso-para-margin-bottom:. 0001pt; mso-pagination:widow-orphan; font-size:11. 0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}}

Trusted WEB 4.0 – Infrastruktur für eine Digitalverfassung: Handlungsempfehlungen für die Gesetzgebung, Gesellschaft und soziale Marktwirtschaft (Xpert.press)

by Olaf Berberich

Die totalitären Tendenzen des Internets sind unübersehbar. Wir steuern auf den gläsernen Menschen ohne Freiheitsrechte zu. Geschäftskonzepte weniger Global Player schalten Milliarden Menschen gleich. Die langfristigen Auswirkungen auf die Gesellschaft werden nicht bedacht. Der Autor zeigt konkret, wie die Demokratie nachhaltig in die digitale Gesellschaft übernommen werden kann. Die zukünftige Beherrschung der Menschen durch totalitäre globale Systeme und künstliche Intelligenzen wird ausgeschlossen.Alle Bürger und die regionale Wirtschaft werden in die digitale Wertschöpfungskette fair und leistungsangepasst eingebunden.

Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI

by Beena Ammanath

An essential resource on artificial intelligence ethics for business leaders In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application Best practices, mechanisms, and governance considerations for embedding AI ethics in business processes and decision making Written to inform executives, managers, and other business leaders, Trustworthy AI breaks new ground as an essential resource for all organizations using AI.

Trustworthy AI: African Perspectives

by Damian Okaibedi Eke Kutoma Wakunuma Simisola Akintoye George Ogoh

This book is an Open Access Publication. The Guidelines for Trustworthy AI developed by the European Commission High-Level Expert Group on AI is a framework that has been developed to promote and achieve the trustworthiness of AI systems. It provides seven ethical principles that can be operationalised in socio-technical systems to realise responsible AI design and deployment. The content of this book is shaped around these principles. In chapter one, the concept of Human Agency and oversight will be described from the lens of a social-cultural understanding of Agency, Autonomy, and oversight including a debate on the place of human rights and power dynamics. Beyond the Trustworthy AI discourse, this book will appeal to the wider AI developers community, civil society, policymakers, ICT and the RRI community. It will also appeal to other subject areas within the Social Sciences and Humanities including; Law and Technology and Digital Culture.

Trustworthy AI - Integrating Learning, Optimization and Reasoning: First International Workshop, TAILOR 2020, Virtual Event, September 4–5, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12641)

by Fredrik Heintz Michela Milano Barry O’Sullivan

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on the Foundation of Trustworthy AI - Integrating Learning, Optimization and Reasoning, TAILOR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 11 revised full papers presented together with 6 short papers and 6 position papers were reviewed and selected from 52 submissions. The contributions address various issues for Trustworthiness, Learning, reasoning, and optimization, Deciding and Learning How to Act, AutoAI, and Reasoning and Learning in Social Contexts.

Trustworthy Artificial Intelligence for Healthcare: Second International Workshop, TAI4H 2024, Jeju, South Korea, August 4, 2024, Proceedings (Lecture Notes in Computer Science #14812)

by Daguang Xu Hao Chen Yuyin Zhou Varut Vince Vardhanabhuti

This book constitutes the proceedings of Second International Workshop on Trustworthy Artificial Intelligence for Healthcare, TAI4H 2024, held in Jeju, South Korea, in August 2024, in conjunction with the International Joint Conference on Artificial Intelligence, IJCAI 2024. The 13 full papers included in this book were carefully reviewed and selected from 21 submissions. They focus on trustworthy artificial intelligence, healthcare, generalization, explainability, fairness, privacy, multi-modal fusion, foundation models.

Trustworthy Artificial Intelligence Implementation: Introduction to the TAII Framework (Business Guides on the Go)

by Josef Baker-Brunnbauer

Rapidly developing Artificial Intelligence (AI) systems hold tremendous potential to change various domains and exert considerable influence on societies and organizations alike. More than merely a technical discipline, AI requires interaction between various professions. Based on the results of fundamental literature and empirical research, this book addresses the management’s awareness of the ethical and moral aspects of AI. It seeks to fill a literature gap and offer the management guidance on tackling Trustworthy AI Implementation (TAII) while also considering ethical dependencies within the company. The TAII Framework introduced here pursues a holistic approach to identifying systemic ethical relationships within the company ecosystem and considers corporate values, business models, and common goods aspects like the Sustainable Development Goals and the Universal Declaration of Human Rights. Further, it provides guidance on the implementation of AI ethics in organisations without requiring a deeper background in philosophy and considers the social impacts outside of the software and data engineering setting. Depending on the respective legal context or area of application, the TAII Framework can be adapted and used with a range of regulations and ethical principles. This book can serve as a case study or self-review for c-level managers and students who are interested in this field. It also offers valuable guidelines and perspectives for policymakers looking to pursue an ethical approach to AI.

Trustworthy Cloud Computing

by Vladimir O. Safonov

Introduces the topic of cloud computing with an emphasis on the trustworthiness of cloud computing systems and services This book describes the scientific basis of cloud computing, explaining the ideas, principles, and architectures of cloud computing as well the different types of clouds and the services they provide. The text reviews several cloud computing platforms, including Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo. The author addresses the problem of trustworthiness in cloud computing and provides methods to improve the security and privacy of cloud applications. The end-of-chapter exercises and supplementary material on the book's companion website will allow readers to grasp the introductory and advanced level concepts of cloud computing. Examines cloud computing platforms such as Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo Analyzes the use of aspect-oriented programming (AOP) for refactoring cloud services and improving the security and privacy of cloud applications Contains practical examples of cloud computing, test questions, and end-of-chapter exercises Includes presentations, examples of cloud projects and other teaching resources at the author's website (http://www.vladimirsafonov.org/cloud) Trustworthy Cloud Computing is written for advanced undergraduate and graduate students in computer science, data science, and computer engineering as well as software engineers, system architects, system managers, and software developers new to cloud computing.

Trustworthy Communications and Complete Genealogies: Unifying Ancestries for a Genealogical History of the Modern World (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Reagan W. Moore

This book discusses how a genealogical history of the modern world can be created by linking the Royal Families of Western Europeans database to Unifying Ancestry. This new edition extends the original analysis by including a coherence metric to evaluate the content of the Unifying Ancestry database, which is freely available online educational software within the CoreGen3 analysis workbench. The author discusses why common ancestors of the Royal Families of Western Europe comprise an optimal Unifying Ancestry experience and further illustrates this by using historically influential people as examples. Specifically, algorithms for validating the Unifying Ancestry are applied to a 330,000-person Research Genealogy and then used to link to historical royal descendants. Genealogical evaluation properties for consistency, correctness, closure, connectivity, completeness and coherence are demonstrated. These properties are applied to a Research Genealogy to generate a unifying ancestry for western Europeans. The unifying ancestry is then used to create a genealogical history of the modern world. All the analyses can be reproduced by readers using the Unifying Ancestry CoreGen3 program.

Refine Search

Showing 57,376 through 57,400 of 60,741 results