DE eng

Search in the Catalogues and Directories

Page: 1 2 3 4 5 6 7...10
Hits 41 – 60 of 199

41
O projeto Edição Digital dos Vocabulários da Academia das Ciências de Lisboa: o VOLP 1940 ...
Salgado, Ana; Costa, Rute. - : Zenodo, 2019
BASE
Show details
42
Marcas temáticas en los diccionarios académicos ibéricos: estudio comparativo ...
Salgado, Ana; Costa, Rute. - : Zenodo, 2019
BASE
Show details
43
TEI Lex-0 In Action: Improving the Encoding of the Dictionary of the Academia das Ciências de Lisboa ...
Salgado, A; Costa, R.; Tasovac, T. - : Zenodo, 2019
BASE
Show details
44
A good TACTIC for lexicographical work: football terms encoded in TEI Lex-0 ...
Salgado, Ana; Costa, Rute. - : Zenodo, 2019
BASE
Show details
45
Improving the consistency of usage labelling in dictionaries with TEI Lex-0 ...
Salgado, Ana; Costa, Rute; Tasovac, Toma. - : Zenodo, 2019
BASE
Show details
46
TEI Lex-0: a good fit for the encoding of the Portuguese Academy Dictionary? ...
Salgado, Ana; Costa, Rute; Tasovac, Toma. - : Zenodo, 2019
BASE
Show details
47
TEI Lex-0: a good fit for the encoding of the Portuguese Academy Dictionary? ...
Salgado, Ana; Costa, Rute; Tasovac, Toma. - : Zenodo, 2019
BASE
Show details
48
AMEND: open source and data-driven oversight of water quality in New England
In: Media and Communication ; 7 ; 3 ; 91-103 ; civic organizations in an age of distrust (2019)
BASE
Show details
49
Solve for X(ML): Transforming metadata to transform data access
Huck, John. - 2019
BASE
Show details
50
Communication access: Is there some common ground between the experiences of people with aphasia and speakers of English as an additional language?
In: Research outputs 2014 to 2021 (2018)
BASE
Show details
51
Retaining Data Ownership in the Internet of Things
Shafagh, Hossein. - : ETH Zurich, 2018
Abstract: As Internet of Things (IoT) systems further emerge, we face unprecedented security and privacy challenges, especially with regards to the collected data. This data typically consists of sensor readings, tagged with metadata. For scalability, ubiquitous access, and sharing possibilities, the data is most often stored in the cloud. Securing date while in transit and in particular when being stored in the cloud is of utmost importance, as the data can be used to infer privacy-sensitive information. Moreover, transparent and secure data sharing (e.g., sharing with friends or domain experts) is considered a key requirement for the practicality and success of typical IoT systems. In today’s cloud-centric designs, users have no choice but to trust centralized parties. The increased number of security and privacy incidents, such as system compromises or unauthorized trade with users data, show that this trust is not always justified. Despite varying levels of privacy-awareness among users of different age and geopolitical groups, and even societal shifts towards privacy pragmatism and indifference, the security and privacy threats do usually have far-reaching implications, demanding adequate mechanisms and measures to address them. In this dissertation, we investigate building secure IoT systems that protect data confidentiality and retain data ownership. We build secure systems that allow reducing the trust end-users are required to put into third parties within the IoT ecosystem, specifically towards the cloud storage and service providers. More importantly, we take a new approach on empowering the user with ownership and fine-grained access control for IoT data without sacrificing performance or security. In particular, we present three approaches to enabling a secure IoT ecosystem: (i) Talos: Talos is a system that stores IoT data securely in a cloud database while still allowing query processing over the encrypted data. Talos protects data even if the server is compromised. We enable this by encrypting IoT data with a set of cryptographic schemes such as order- preserving and partially homomorphic encryption. We tailor Talos to accommodate for the resource asymmetry of the IoT, particularly towards constrained IoT devices. We assess the feasibility of Talos on low-power devices with and without cryptographic hardware accelerators and quantify its overhead concerning energy consumption, computation time, and latency. With a thorough evaluation of our prototype implementation, we show that Talos is a practical system that can provide a high level of security with reasonable overhead. (ii) Pilatus: Storage of data on cloud services naturally facilitates data sharing with third-party services and other users, but bears privacy risks. We present Pilatus, a data protection platform that extends Talos where the cloud stores only encrypted data, yet is still able to process a defined set of database queries (e.g., range or sum). Pilatus features a novel encrypted data sharing scheme based on re-encryption, with revocation capabilities and in situ key-update. Our solution includes a suite of novel techniques that enable efficient partially homomorphic encryption, decryption, and sharing. We present performance optimizations that render these cryptographic tools practical for mobile platforms. We implement a prototype of Pilatus and evaluate it thoroughly. Our optimizations achieve a performance gain within one order of magnitude compared to state-of-the-art realizations. (iii) Droplet: Droplet is a secure data management system that we designed from the ground up to accommodate for the distributed nature of the IoT and revive the IoT from the current vertical design paradigm. The consequent myriad of isolated data silos of classical vertical architectures is hard to manage and prevent heterogeneous applications from interacting with our IoT data. To address this challenge, we leverage the blockchain technology to bootstrap trust for a distributed, secure, and resilient access control and data management scheme. Droplet handles time series data, enables reliable sharing among heterogeneous applications without intermediate trust entities, and features a cryptographically-protected fine-grained and scalable access control mechanism to data streams. We leverage a hash-chain-based key management mechanism to enable interval sharing and compact key distribution. The built-in cryptocurrency feature of blockchains allows the integration of economic incentives into our system. These properties enable a variety of applications that are presently not easily realizable using existing systems. The systems proposed and discussed in this dissertation demonstrate that end-to-end encryption with secure sharing can be achieved in IoT ecosystems with a modest overhead, while maintaining a consistent user- experience.
Keyword: Access Control; Authentication; Authorization; computer science; Data processing; Database; Encrypted Data Processing; Homomorphic Encryption; info:eu-repo/classification/ddc/4; internet of things; IoT; Privacy; Security
URL: https://doi.org/10.3929/ethz-b-000282188
https://hdl.handle.net/20.500.11850/282188
BASE
Hide details
52
The Extension for Geosciences (EFG) of the Access to Biological Collection Data (ABCD) schema ...
Kiessling, W.; Copp, C.; Rissoné, A.. - : Museum für Naturkunde Berlin, Leibniz Institute for Evolution and Biodiversity Science, 2017
BASE
Show details
53
Editing and Presenting Complex Source Material in an Online Dictionary: The Case of ONP
In: Proceedings of the 17th EURALEX International Congress: Lexicography and Linguistic Diversity. Tbilisi, Georgia 6 - 10 September 2016 (2016), 117-128
IDS OBELEX meta
Show details
54
Research data management, a chance for Open Science. Methods and tutorials to create a Data Management Plan ( DMP)
In: DARIAH's Humanities at Scale Winter School ; https://hal.inria.fr/hal-01416978 ; DARIAH's Humanities at Scale Winter School, Dariah; Humanities at Scale, Oct 2016, Prague, Czech Republic ; http://datacite.hypotheses.org/ (2016)
BASE
Show details
55
Su voz, su decisión : data-driven system to support day laborers in making informed employment decisions
BASE
Show details
56
Towards an Electronic Specialized Dictionary for Learners
In: Electronic lexicography in the 21st century: linking lexical data in the digital age. Proceedings of the eLex 2015 conference, 11 - 13 August 2015, Herstmonceux Castle, United Kingdom (2015), 51-69
IDS OBELEX meta
Show details
57
medialatinitas.eu. Towards Shallow Integration of Lexical, Textual and Encyclopaedic Resources for Latin
In: Electronic lexicography in the 21st century: linking lexical data in the digital age. Proceedings of the eLex 2015 conference, 11 - 13 August 2015, Herstmonceux Castle, United Kingdom (2015), 152-169
IDS OBELEX meta
Show details
58
Mobile Lexicography: Let's Do it Right This Time!
In: Electronic lexicography in the 21st century: linking lexical data in the digital age. Proceedings of the eLex 2015 conference, 11 - 13 August 2015, Herstmonceux Castle, United Kingdom (2015), 84-104
IDS OBELEX meta
Show details
59
Das Lehnwortportal Deutsch als kontaktlinguistisches Forschungsinstrument
In: Lehnwörter im Slawischen. Empirische und crosslinguistische Perspektiven (2015), 149-170
IDS OBELEX meta
Show details
60
Phases and Steps in the Access to Data in Information Tools
In: Lexikos; Vol. 25 (2015) ; 2224-0039 (2015)
BASE
Show details

Page: 1 2 3 4 5 6 7...10

Catalogues
0
1
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
42
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
156
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern