Security, privacy and trust of user-centric solutions

被引:12
|
作者
Akram, Raja Naeem [1 ]
Chen, Hsiao-Hwa [2 ]
Lopez, Javier [3 ]
Sauveron, Damien [4 ]
Yang, Laurence T. [5 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp Smart Card Ctr, Egham, Surrey, England
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[3] Univ Malaga, Comp Sci Dept, Ada Byron Bldg, Malaga 29071, Spain
[4] Univ Limoges, CNRS, XLIM, UMR 7252,MathIS, Limoges, France
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS, Canada
基金
英国工程与自然科学研究理事会;
关键词
User-centric solutions; Security; Privacy; Trust; INTERNET; THINGS;
D O I
10.1016/j.future.2017.11.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of pervasive and ubiquitous computing, of IoT and personal devices, user-centric solutions will be the paradigm for most of the future applications. In this context, user-centric solutions must be proposed from deployment models to the content management. Obviously suitable Security, Privacy and Trust (SPT) solutions have to be proposed to ensure the smooth operation of systems and their straightforward managements required for a successful mass-user adoption. In this paper, we summarize the literature related to user-centric SPT scenarios and present a selection of the most recent advances in these areas. (C) 2017 Published by Elsevier B.V.
引用
收藏
页码:417 / 420
页数:4
相关论文
共 50 条
  • [31] Realization of a user-centric, privacy preserving permission framework for Android
    Nauman, Mohammad
    Khan, Sohail
    Othman, Abu Talib
    Musa, Shahrulniza
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 368 - 382
  • [32] FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps
    Meftah, Lakhdar
    Rouvoy, Romain
    Chrisment, Isabelle
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2019, 2019, 11534 : 116 - 132
  • [33] User-Centric Privacy for Identity Federations Based on a Recommendation System
    Villaran, Carlos
    Beltran, Marta
    ELECTRONICS, 2022, 11 (08)
  • [34] PassBio: Privacy-Preserving User-Centric Biometric Authentication
    Zhou, Kai
    Ren, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 3050 - 3063
  • [35] User-Centric Privacy Preservation in Data-Sharing Applications
    Gao, Feng
    He, Jingsha
    Peng, Shufen
    NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 423 - +
  • [36] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [37] User-Centric Federated Matrix Factorization Based on Differential Privacy
    Liu, Yang
    Xu, Wanyin
    Lai, Jiaxin
    Wang, Jiabo
    IEEE INTERNET COMPUTING, 2023, 27 (03) : 21 - 27
  • [38] PDMFRec: A Decentralised Matrix Factorisation with Tunable User-centric Privacy
    Duriakova, Erika
    Tragos, Elias Z.
    Smyth, Barry
    Hurley, Neil
    Pena, Francisco J.
    Symeonidis, Panagiotis
    Geraci, James
    Lawlor, Aonghus
    RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, : 457 - 461
  • [39] A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
    Herrmann, Dominik
    Scheuer, Florian
    Feustel, Philipp
    Nowey, Thomas
    Federrath, Hannes
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 32 - 41
  • [40] A mapping of IoT user-centric privacy preserving approaches to the GDPR
    Kounoudes, Alexia Dini
    Kapitsaki, Georgia M.
    INTERNET OF THINGS, 2020, 11