Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Cyber Center Publications (3)
- Electrical & Computer Engineering Faculty Publications (1)
- Faculty of Science - Papers (Archive) (1)
- Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12) (1)
- Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث (1)
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha
Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
In the digital age, internet users are exposed to privacy issues online. Few rarely know when someone else is eavesdropping or about to scam them. Companies, governments, and individual internet users are all vulnerable to security breaches due to the challenges of online privacy ranging from trust and hierarchical control to financial losses. As systems advance, people are optimistic that forensic science will provide long-term interventions that surpass the current solutions, including setting stronger passwords and firewall protection. The future of online privacy is changing, and more practical interventions, such as email, malware, mobile, and network forensics, must be integrated, …
Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan
Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan
Electrical & Computer Engineering Faculty Publications
The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnology in each aspect of the society is expanding and overlapping with the cyberworld. This intersection, which has been described as “biocybersecurity” (BCS), can become a major front of the 21st-century conflicts. There are three lines of BCS which make it a critical component of overall cybersecurity: (1) cyber operations within the area of BCS have life threatening consequences to a greater extent than other cyber operations, (2) the breach in health-related personal data is a significant tool for fatal attacks, and (3) health-related misinformation …
Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols
Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols
Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)
Presenter: Peter D. Nichols, Esq., Partner, Berg, Hill, Greenleaf and Ruscitti, Boulder, CO
25 slides
Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino
Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino
Cyber Center Publications
Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control. To obtain accurate and trustworthy location data, analysts must often gather and correlate information from several independent sources, e.g., physical observation, witness testimony, surveillance footage, etc. However, such information may be fraudulent, its accuracy may be low, and its vol-
ume may be insufficient to ensure highly trustworthy data. On the other hand, recent advancements in mobile computing and positioning systems, e.g., GPS-enabled cell phones, highway sensors, etc., bring new and effective technological means to track the location of …
Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino
Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino
Cyber Center Publications
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations. One technique that has been proposed is to augment role-based access control (RBAC) with spatial constraints. In such a system, an authorized user must be in a designated location in order to exercise the privileges associated with a role. In this work, we extend spatially aware RBAC systems by defining the notion of …
Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino
Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino
Cyber Center Publications
An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding …
Slides: Threats To Biological Diversity: Global, Continental, Local, J. Michael Scott
Slides: Threats To Biological Diversity: Global, Continental, Local, J. Michael Scott
Shifting Baselines and New Meridians: Water, Resources, Landscapes, and the Transformation of the American West (Summer Conference, June 4-6)
Presenter: J. Michael Scott, U.S. Geological Survey, Idaho Cooperative Fish and Wildlife Research Unit, University of Idaho
38 slides
New Applications Of Modulated Digital Images In Document Security, Robert A. Lee, Patrick W. Leech, Lawrey D. Mccarthy, Gerhard F. Swiegers
New Applications Of Modulated Digital Images In Document Security, Robert A. Lee, Patrick W. Leech, Lawrey D. Mccarthy, Gerhard F. Swiegers
Faculty of Science - Papers (Archive)
In previous work we have demonstrated that selective masking, or modulation, of digital images can be used to create documents and transparent media containing covert or optically variable, overt images. In the present work we describe new applications and techniques of such "modulated digital images" (MDI's) in document security. In particular, we demonstrate that multiple hidden images can be imperceptibly concealed within visible, host images by incorporating them as a new, half-tone, printing screen. Half-toned hidden images of this type may contain a variety of novel features that hinder unauthorized copying, including concealed multiple images, and microprinted-, color-, and various …
Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko
Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko
Pr. Mamoudou H. DICKO, PhD
The latest estimates of the FAO demonstrate the problems of the fight against hunger. These problems are manifested by the ever-increasing number of chronically undernourished people worldwide. Their numbers during the 1999-2001 period were estimated at about 840 million of which 798 million live in developing countries. Sub-Saharan Africa alone represented 198 million of those. In this part of Africa the prevalence of undernourishment ranges from 5-34%, causing growth retardation and insufficient weight gain among one third of the children under five years of age and resulting in a mortality of 5-15% among these children. Malnutrition resulting from undernourishment is …