611 research outputs found

    A key Management Scheme for Access Control to GNSS Services

    Get PDF
    Conditional access is a challenging problem in GNSS scenarios. Most key management schemes present in literature can not cope with all GNSS related issues, such as extremely low bandwidth, stateless receivers and the absence of an aiding channel. After assessing existing techniques, a novel key management scheme called RevHash has been devised with particular emphasis on guaranteeing revocation capabilities to the system, in order for it to be robust against anomalies and attacks

    Property Rights, Reliance, and Retroactivity Under the Communications Act of 1934

    Get PDF
    Although the FCC and courts have concluded that licensees have certain property interests in their licenses, they do not acquire any ownership interests even when, via a spectrum auction, they pay for their licenses. What narrow property interests licensees maintain are limited, and the FCC has broad power to modify existing licenses if doing so is in the public interest. License owners have sought to limit or defeat otherwise lawful FCC actions to alter their licenses by asserting a reliance interest on prior agency action or policy. Licensees may find comfort in the fact that some courts have acknowledged these claims, and have determined that the FCC, at a minimum, must treat licensees equitably. It is proposed that, even in the absence of traditional property rights, such claims be available to facilitate careful judicial review of FCC action

    Property Rights, Reliance, and Retroactivity Under the Communications Act of 1934

    Get PDF
    Although the FCC and courts have concluded that licensees have certain property interests in their licenses, they do not acquire any ownership interests even when, via a spectrum auction, they pay for their licenses. What narrow property interests licensees maintain are limited, and the FCC has broad power to modify existing licenses if doing so is in the public interest. License owners have sought to limit or defeat otherwise lawful FCC actions to alter their licenses by asserting a reliance interest on prior agency action or policy. Licensees may find comfort in the fact that some courts have acknowledged these claims, and have determined that the FCC, at a minimum, must treat licensees equitably. It is proposed that, even in the absence of traditional property rights, such claims be available to facilitate careful judicial review of FCC action

    Privacy in the Smart City - Applications, Technologies, Challenges and Solutions

    Get PDF
    Many modern cities strive to integrate information technology into every aspect of city life to create so-called smart cities. Smart cities rely on a large number of application areas and technologies to realize complex interactions between citizens, third parties, and city departments. This overwhelming complexity is one reason why holistic privacy protection only rarely enters the picture. A lack of privacy can result in discrimination and social sorting, creating a fundamentally unequal society. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. We therefore systematize the application areas, enabling technologies, privacy types, attackers and data sources for the attacks, giving structure to the fuzzy term “smart city”. Based on our taxonomies, we describe existing privacy-enhancing technologies, review the state of the art in real cities around the world, and discuss promising future research directions. Our survey can serve as a reference guide, contributing to the development of privacy-friendly smart cities

    Data exploitation and privacy protection in the era of data sharing

    Get PDF
    As the amount, complexity, and value of data available in both private and public sectors has risen sharply, the competing goals of data privacy and data utility have challenged both organizations and individuals. This dissertation addresses both goals. First, we consider the task of {\it interorganizational data sharing}, in which data owners, data clients, and data subjects have different and sometimes competing privacy concerns. A key challenge in this type of scenario is that each organization uses its own set of proprietary, intraorganizational attributes to describe the shared data; such attributes cannot be shared with other organizations. Moreover, data-access policies are determined by multiple parties and may be specified using attributes that are not directly comparable with the ones used by the owner to specify the data. We propose a system architecture and a suite of protocols that facilitate dynamic and efficient interorganizational data sharing, while allowing each party to use its own set of proprietary attributes to describe the shared data and preserving confidentiality of both data records and attributes. We introduce the novel technique of \textit{attribute-based encryption with oblivious attribute translation (OTABE)}, which plays a crucial role in our solution and may prove useful in other applications. This extension of attribute-based encryption uses semi-trusted proxies to enable dynamic and oblivious translation between proprietary attributes that belong to different organizations. We prove that our OTABE-based framework is secure in the standard model and provide two real-world use cases. Next, we turn our attention to utility that can be derived from the vast and growing amount of data about individuals that is available on social media. As social networks (SNs) continue to grow in popularity, it is essential to understand what can be learned about personal attributes of SN users by mining SN data. The first SN-mining problem we consider is how best to predict the voting behavior of SN users. Prior work only considered users who generate politically oriented content or voluntarily disclose their political preferences online. We avoid this bias by using a novel type of Bayesian-network (BN) model that combines demographic, behavioral, and social features. We test our method in a predictive analysis of the 2016 U.S. Presidential election. Our work is the first to take a semi-supervised approach in this setting. Using the Expectation-Maximization (EM) algorithm, we combine labeled survey data with unlabeled Facebook data, thus obtaining larger datasets and addressing self-selection bias. The second SN-mining challenge we address is the extent to which Dynamic Bayesian Networks (DBNs) can infer dynamic behavioral intentions such as the intention to get a vaccine or to apply for a loan. Knowledge of such intentions has great potential to improve the design of recommendation systems, ad-targeting mechanisms, public-health campaigns, and other social and commercial endeavors. We focus on the question of how to infer an SN user\u27s \textit{offline} decisions and intentions using only the {\it public} portions of her \textit{online} SN accounts. Our contribution is twofold. First, we use BNs and several behavioral-psychology techniques to model decision making as a complex process that both influences and is influenced by static factors (such as personality traits and demographic categories) and dynamic factors (such as triggering events, interests, and emotions). Second, we explore the extent to which temporal models may assist in the inference task by representing SN users as sets of DBNs that are built using our modeling techniques. The use of DBNs, together with data gathered in multiple waves, has the potential to improve both inference accuracy and prediction accuracy in future time slots. It may also shed light on the extent to which different factors influence the decision-making process

    Debating Transformations of National Citizenship

    Get PDF
    This open access book discusses how national citizenship is being transformed by economic, social and political change. It focuses on the emergence of global markets where citizenship is for sale and on how new reproduction technologies impact citizenship by descent. It also discusses the return of banishment through denationalisation of terrorist suspects, and the impact of digital technologies, such as blockchain, on the future of democratic citizenship. The book provides a wide range of views on these issues from legal scholars, political scientists, and political practitioners. It is structured as a series of four conversations in which authors respond to each other. This exchange of arguments provides unique depth to current debates about the future of citizenship

    US Telecommunications Law

    Full text link
    • …
    corecore