Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems.
Mohammad Hossein Ronaghi+1 more
doaj
Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li+6 more
doaj +1 more source
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about this increasingly important subject.
openaire +1 more source
When Is a Function Securely Computable? [PDF]
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided
Himanshu Tyagi+2 more
openaire +4 more sources
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David+2 more
core +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem [PDF]
Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses.
Huang, Wei+3 more
core +1 more source
Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera+3 more
doaj +1 more source
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks
Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup (P&XE) scheme is proposed.
Junfeng Tian, Zilong Wang, Zhen Li
doaj +1 more source
Patterns of information security postures for socio-technical systems and systems-of-systems [PDF]
This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems.
Glisson, W., Renaud, K., Storer, T.
core