- Table View
- List View
Trust No One: Inside the World of Deepfakes
by Michael GrothausDeepfake technology can create video evidence of just about anything: Hollywood superstar Margot Robbie in an orgyChinese president Xi Jinping declaring nuclear warbasketball legend Michael Jordan winning the World Cup. The only limit is the imagination. In a time where fake news and disinformation is becoming harder and harder to identify, it is more essential than ever to understand the dark origins of deepfakes. Journalist Michael Grothaus goes down the rabbit hole as he interviews the often morally dubious, yet incredibly skilled creators of this content. It's a journey that opens a window into the communities transforming reality. Challenging, enlightening and terrifying, Trust No One asks the question other people are too scared to: what happens when you can no longer believe your own eyes?'Michael Grothaus takes a hard look at the growth of deep fakes, examining cases that demonstrate the threats presented by morally dubious creators. From the personal to political, the impact of deep fakes is considered carefully by Grothaus, both on the victims and on society as a whole, creating an essential picture of a growing trend in disinformation.' Eliot Higgins, founder of Bellingcat
Trust No One: Inside the World of Deepfakes
by Michael GrothausDeepfake technology can create video evidence of just about anything: Hollywood superstar Margot Robbie in an orgyChinese president Xi Jinping declaring nuclear warbasketball legend Michael Jordan winning the World Cup. The only limit is the imagination. In a time where fake news and disinformation is becoming harder and harder to identify, it is more essential than ever to understand the dark origins of deepfakes. Journalist Michael Grothaus goes down the rabbit hole as he interviews the often morally dubious, yet incredibly skilled creators of this content. It's a journey that opens a window into the communities transforming reality. Challenging, enlightening and terrifying, Trust No One asks the question other people are too scared to: what happens when you can no longer believe your own eyes?'An alarming look at deepfakes' The Sunday Times'Michael Grothaus takes a hard look at the growth of deep fakes, examining cases that demonstrate the threats presented by morally dubious creators. From the personal to political, the impact of deep fakes is considered carefully by Grothaus, both on the victims and on society as a whole, creating an essential picture of a growing trend in disinformation.' Eliot Higgins, founder of Bellingcat
Trust No One: Inside the World of Deepfakes
by Michael GrothausDeepfake technology can create video evidence of just about anything: Hollywood superstar Margot Robbie in an orgy; Chinese president Xi Jinping declaring nuclear war; basketball legend Michael Jordan winning the World Cup. The only limit is the imagination. In a time where fake news and disinformation is becoming harder and harder to identify, it is more essential than ever to understand the dark origins of deepfakes. Journalist Michael Grothaus goes down the rabbit hole as he interviews the often morally dubious, yet incredibly skilled creators of this content. It's a journey that opens a window into the communities transforming reality. Challenging, enlightening and terrifying, this audiobook asks the question other people are too scared to: what happens when you can no longer believe your own eyes?(P) 2021 Hodder & Stoughton Limited
Trust, Privacy and Security in Digital Business: 18th International Conference, TrustBus 2021, Virtual Event, September 27–30, 2021, Proceedings (Lecture Notes in Computer Science #12927)
by Simone Fischer-Hübner Costas Lambrinoudakis Gabriele Kotsis A Min Tjoa Ismail KhalilThis volume LNCS 12927 constitutes the papers of the 18th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2021, held in September 2021 as part of the DEXA 2021 conference. The event was held virtually due to COVID-19 pandemic. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust Evaluation; Security Risks; Web Security; Data Protection and Privacy Controls; and Privacy and Users
Trust, Privacy and Security in Digital Business
by Simone Fischer-Hübner Costas Lambrinoudakis Javier LópezThis book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.
Trust, Privacy and Security in Digital Business: 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings (Lecture Notes in Computer Science #11033)
by Steven Furnell Haralambos Mouratidis Günther PernulThis book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
Trust, Privacy and Security in Digital Business: 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings (Lecture Notes in Computer Science #11711)
by Stefanos Gritzalis Edgar R. Weippl Sokratis K. Katsikas Gabriele Anderst-Kotsis A Min Tjoa Ismail KhalilThis book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: privacy; and audit, compliance and threat intelligence.The chapter "A data utility-driven benchmark for de-identification methods" is open access under a CC BY 4.0 license at link.springer.com.
Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings (Lecture Notes in Computer Science #12395)
by Stefanos Gritzalis Edgar R. Weippl Gabriele Kotsis A Min Tjoa Ismail KhalilThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.
Trust, Privacy and Security in Digital Business: 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings (Lecture Notes in Computer Science #13582)
by Sokratis Katsikas Steven FurnellThis volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection; Honeypots; Homomorphic encryption;, and Serious games.
Trust, Privacy and Security in Digital Business
by Sokratis Katsikas Costas Lambrinoudakis Steven FurnellThis book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic m- ketplace. Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the - tent to which 'information security' and 'user privacy' can be ensured. TrustBus 2009 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Linz to participate and debate the new emerging advances in this area.
Trust, Privacy and Security in Digital Business
by Costas Lambrinoudakis Javier Lopez Simone Fischer-HübnerThis book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic m- ketplace. Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the - tent to which 'information security' and 'user privacy' can be ensured. TrustBus 2009 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Linz to participate and debate the new emerging advances in this area.
Trust, Security and Privacy for Big Data
by Mamoun AlazabData has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the ethos of Big Data which is volume, velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful, scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT, manufacturing, smart cars, power grids etc., but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges, such as generative adversary networks, efficient encryption and decryption algorithms, encrypted information retrieval, attribute-based encryption, attacks on availability, and reliability. Providing security and privacy for big data storage, transmission, and processing have been attracting much attention in all big data related areas.The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers, academicians, students, and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT, cyber physical domains, big data architectures, studies for trustworthy computing, and approaches for distributed systems and big data security solutions etc.
Trust, Social Relations and Engagement
by Donatella PaduaIn the Internet Age, horizontal value chains generated by peer-to-peer relationships have to be integrated in economic vertical processes. This means that all institutions, from the economical to the political, to the cultural or technological have to turn their approach into a 'social' one. This doesn't mean embracing a no-profit perspective: indeed it implies designing new trust and engagement strategies to generate positive win-win situations with stakeholders. Through the tools offered by sociology, a specific indication on how to build and measure value out of these strategies is offered by the 'Value for Engagement Model'. Behind the model, the innovative concept of Value for Engagement allows the definition of focused strategies to build value through achieving the stakeholders' commitment and activating emotional ties to the organisation. In this new role of 'pulling' stakeholders, the prerequisite is to be perceived as trustworthy.
Trusted Cellular IoT Devices: Design Ingredients and Concepts (Synthesis Lectures on Engineering, Science, and Technology)
by Kersten HeinsThis book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
Trusted Computing and Information Security: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Communications in Computer and Information Science #960)
by Huanguo Zhang Bo Zhao Fei YanThis book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers (Communications in Computer and Information Science #1149)
by Liehuang Zhu Fei Yan Weili HanThis book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.
Trusted Computing for Embedded Systems
by Bernard Candaele Dimitrios Soudris Iraklis AnagnostopoulosThis book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. · Enables readers to address a variety of security threats to embedded hardware and software; · Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; · Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.
Trusted Computing Platforms
by Graeme Proudler Liqun Chen Chris DaltonIn this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
Trusted Data, revised and expanded edition: A New Framework for Identity and Data Sharing
by Thomas Hardjono David L. Shrier Alex PentlandHow to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted.ContributorsMichiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy ZyskindAn MIT Connection Science and Engineering Book
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention And Detection
by Hassan SalmaniThis book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.
Trusted Execution Environments
by Konstantinos Markantonakis Carlton ShepherdTrusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.
Trusted Systems
by Moti Yung Jianbiao Zhang Zhen YangThis book constitutes the thoroughly refereedpost-conference proceedings of the 7th International Conference on TrustedSystems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have beencarefully reviewed and selected from 29 submissions. They are devoted to allaspects of trusted computing systems, including trusted modules, platforms;networks, services and applications. The papers are organized in the followingsections: encryptions and signatures; security model; trusted technologies;software and system security.
Trusted Systems
by Moti Yung Liehuang Zhu Yanjiang YangNormal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrialresearchers, designers, and implementers with end-users of trusted systems, inorder to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications oftrusted systems and cover all aspects of trusted computing systems, includingtrusted modules, platforms, networks, services and applications, from theirfundamental features and functionalities to design principles, architecture andimplementation technologies. /* Style Definitions */ table. MsoNormalTable {{mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5. 4pt 0in 5. 4pt; mso-para-margin:0in; mso-para-margin-bottom:. 0001pt; mso-pagination:widow-orphan; font-size:11. 0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}}
Trusted WEB 4.0 – Infrastruktur für eine Digitalverfassung: Handlungsempfehlungen für die Gesetzgebung, Gesellschaft und soziale Marktwirtschaft (Xpert.press)
by Olaf BerberichDie totalitären Tendenzen des Internets sind unübersehbar. Wir steuern auf den gläsernen Menschen ohne Freiheitsrechte zu. Geschäftskonzepte weniger Global Player schalten Milliarden Menschen gleich. Die langfristigen Auswirkungen auf die Gesellschaft werden nicht bedacht. Der Autor zeigt konkret, wie die Demokratie nachhaltig in die digitale Gesellschaft übernommen werden kann. Die zukünftige Beherrschung der Menschen durch totalitäre globale Systeme und künstliche Intelligenzen wird ausgeschlossen.Alle Bürger und die regionale Wirtschaft werden in die digitale Wertschöpfungskette fair und leistungsangepasst eingebunden.
Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
by Beena AmmanathAn essential resource on artificial intelligence ethics for business leaders In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application Best practices, mechanisms, and governance considerations for embedding AI ethics in business processes and decision making Written to inform executives, managers, and other business leaders, Trustworthy AI breaks new ground as an essential resource for all organizations using AI.