2022
DOI: 10.48550/arxiv.2201.02563
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security Considerations for Virtual Reality Systems

Abstract: There is a growing need for authentication methodology in virtual reality applications. Current systems assume that the immersive experience technology is a collection of peripheral devices connected to a personal computer or mobile device. Hence there is a complete reliance on the computing device with traditional authentication mechanisms to handle the authentication and authorization decisions. Using the virtual reality controllers and headset poses a different set of challenges as it is subject to unauthor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…The experiments demonstrate the accuracy and ability of semantic web technologies to eliminate noisy hyperlinks. In the preceding mechanisms as well as others such as [1], [20], [21], [22], [23], [24], existing data collections are not used for information retrieval; rather, noisy hyperlinks are removed through analysis of the web structure graph. Therefore, we need to construct a data collection of hyperlinks.…”
Section: Related Workmentioning
confidence: 99%
“…The experiments demonstrate the accuracy and ability of semantic web technologies to eliminate noisy hyperlinks. In the preceding mechanisms as well as others such as [1], [20], [21], [22], [23], [24], existing data collections are not used for information retrieval; rather, noisy hyperlinks are removed through analysis of the web structure graph. Therefore, we need to construct a data collection of hyperlinks.…”
Section: Related Workmentioning
confidence: 99%
“…Our central objective is to develop an effective and auditable privacy-preserving model for federated and blockchain-based settings, addressing the research challenges outlined. Additionally, we intend to apply and generalize our approaches for auditable and privacy-preserving threat detection techniques in these environments [47], [48]. The subsequent subsection discusses the contributions in greater detail.…”
Section: Networkmentioning
confidence: 99%
“…Therefore, it is essential to explore privacy-preserving and auditable solutions. Conducting data protection audits can help determine compliance with GDPR, the Data Protection Act (DPA) 2018, and identify any areas requiring improvement [48], [62].…”
Section: Significance Of the Studymentioning
confidence: 99%
“…However, the lack of audit mechanisms can open the door to potential misuse and violations. Hence, our study focuses on a framework that combines federated and distributed environments to preserve privacy and enable auditability in AI and ML fields [51,52].…”
Section: Significance Of the Studymentioning
confidence: 99%