2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)

9-11 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 37
  • Chair's message

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2015, Page(s):1 - 4
    Request permission for reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Draft programme

    Publication Year: 2015, Page(s):1 - 4
    Request permission for reuse | PDF file iconPDF (294 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | PDF file iconPDF (417 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2015, Page(s):1 - 3
    Request permission for reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • The Networked Society - Challenges and Opportunities

    Publication Year: 2015, Page(s):1 - 21
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    The Networked Society introduces many challenges but even more opportunities for our industry. When everyone and everything is connected, the demand on e.g. capacity, coverage, flexibility and quality on the networks will increase as will that on security, data protection and privacy. The growth of Mobile Broadband and an environment for open innovation will provide systems that can deliver servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MUNIQUE: Multiview no-reference image quality evaluation

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    This paper presents a novel no-reference objective algorithm for stereoscopic image quality assessment, called MUNIQUE, which is based on the estimation of both two-dimensional and stereoscopic features of images, namely local estimations of blockiness and blurriness and the disparity weighting technique. Applications of stereoscopic image and video quality assessment in surveillance systems are d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A presentation format of architecture description based on the concept of multilayer networks

    Publication Year: 2015, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Formal methods based on abstract models are becoming more and more important in the domain of complex computer networks. On the other hand, processes of design documentation transformation into the formal models are still bound to the skills and ingenuity of individual engineers. Moreover, the human factor involved in data transformation represents a major bottleneck due to the tendency of compute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy, consumer trust and big data: Privacy by design and the 3 C'S

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    The growth of ICTs and the resulting data explosion could pave the way for the surveillance of our lives and diminish our democratic freedoms, at an unimaginable scale. Consumer mistrust of an organization's ability to safeguard their data is at an all time high and this has negative implications for Big Data. The timing is right to be proactive about designing privacy into technologies, business ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOSLITE: Lightweight Sensor Observation Service (SOS) for the Internet of Things (IOT)

    Publication Year: 2015, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    The importance and reach of sensors networks grows every year, however, there are still many challenges that must be addressed. One of them, is the standardized interchange of information that enable interoperability between different networks and applications. To answer this challenge, the Open Geospatial Consortium (OGC) has created the Sensor Web Enablement (SWE) specification. SWE has given pl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future mobile communication services on balance between freedom and trust

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Some applications introduced in each 5G mobile communication project (5G-P) assume special use cases such as when many people simultaneously use their mobile phone in a restricted area like a stadium or when using traffic safety systems are in common. And, some of them such as mobile healthcare and the Internet of things (IOT) have already been presented by many people. However, the reasons those ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mauritius eHealth - Trust in the healthcare revolution

    Publication Year: 2015, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The aim of eHealth infrastructure is to harness innovations in digital infrastructure that can enable the seamless access to, sharing and reuse of data (e.g. clinical records, genomic data and images) irrespective of source [1]. eInfrastructure is comprised of networked, interoperable, service-oriented, scalable computational tools and services. The key element is the interaction of human users an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strengthening trust in the future ICT infrastructure

    Publication Year: 2015, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Moving towards a hyperconnected society in the forthcoming "zettabyte" era requires a trusted ICT infrastructure for sharing information and creating knowledge. To advance the efforts to build converged ICT services and reliable information infrastructures, ITU-T has recently started a work item on future trusted ICT infrastructures. In this paper, we introduce the concept of a social-cyber-physic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wi-trust: Improving Wi-Fi hotspots trustworthiness with computational trust management

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks Network Spoofing Attacks as number 6. In this paper, we present how we have validated different computational trust management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi hotspots including spoofing attacks. Then we explain how some of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts

    Publication Year: 2015, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (794 KB) | HTML iconHTML

    Two-factor authentication can significantly reduce risks of compromised accounts by protecting from weak passwords, online identity theft and other online fraud. This paper presents a new easy solution to implement two-factor authentication without affecting user experience by introducing minimum user interaction based on standard Wi-Fi. It has been validated with different software and hardware i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability of radar protocol and proposed mitigation

    Publication Year: 2015, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    The radar system is extremely important. Each government must ensure the safety of passengers and the efficiency of the system. This is why it has to be considered by suitable and high-performance professionals. In this paper, we have focused on the analysis of a protocol used to carry the information of the different flight parameters of an aircraft from the radar sensor to the operation center. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Raising trust in security products and systems through standardisation and certification: The crisp approach

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The need for security systems and related ICT solutions poses new challenges to the individuals in terms of fundamental rights such as the right to privacy. Those challenges generate mistrust at the same time to the end-users. Standardisation and certification can have a significant role in changing the picture and help reinstate the lost confidence. This paper examines the concept of "trust" to I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drones. Current challenges and standardisation solutions in the field of privacy and data protection

    Publication Year: 2015, Page(s):1 - 7
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The issue of drones has burst onto the public agenda due to the rapid expansion from their military and enforcement use to the domestic market where seemingly endless uses appear. This paper is focused on the analysis of the risks to privacy and data protection that arise from these devices and the efforts in Europe to establish a framework to address the problems. The paper's thesis is double: fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulation and standardization of data protection in cloud computing

    Publication Year: 2015, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Standards are often considered as an alternative form of regulation to legislative rule setting. However, standards also complement legislative acts, supporting their effective implementation and providing precise definitions for sometimes vague legal concepts. As we demonstrate, standards are not mere technical regulations but relate to sensitive political issues. The genesis and contents of ISO/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic trust management in cloud-based and highly dynamic IoT applications

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for human-beings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of cloud computing on the transformation of healthcare system in South Africa

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    An increasing number of organisations around the world are making use of information and communications technology (ICT) for health (eHealth) to address healthcare challenges. This includes aggregating vast amounts of data from various sources to create evidence for policy and decision making. However, the eHealth initiative in South Africa is hindered by unreliable ICT platforms. This research st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WHITENET: A white space network for campus connectivity using spectrum sensing design principles

    Publication Year: 2015, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    To this day, the technical challenges of accessing TV white spaces through spectrum sensing can be summed up into its inability to provide maximum protection to primary users from interference. Yet, off-the-shelf spectrum sensing devices, which are emerging on the market at low cost, and the low computation and implementation complexities of the sensing technique, make them more and more attractiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DCO-OFDM system employing beneficial clipping method

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    The existing clipping researches in direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) systems generally originate from insufficient DC bias and the nonlinear transmission characteristics of physical devices which will distort the system performances. In contrast to conventional clipping theories, the beneficial clipping method demonstrated in this paper aims to im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.