Results 21 to 30 of about 25,084,029 (287)

Analyzing the Big Data Security Through a Unified Decision-Making Approach

open access: yesIntelligent Automation and Soft Computing, 2022
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits.
Abdulaziz Attaallah   +5 more
semanticscholar   +1 more source

Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network

open access: yesIEEE Open Journal of the Computer Society, 2021
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun   +3 more
doaj   +1 more source

A New Dynamic Substitution Box for Data Security using an Innovative Chaotic Map

open access: yesIEEE Access, 2022
As the motivations and capabilities of threat actors continue to evolve, providing data security has become more important than ever. For this purpose, different ciphers using various techniques are being developed.
A. Manzoor, A. Zahid, Malik Tahir Hassan
semanticscholar   +1 more source

On the Security of Individual Data [PDF]

open access: yesAnnals of Mathematics and Artificial Intelligence, 2004
We will consider the following problem in this paper: Assume that there are $$n$$ numerical data $$\{x_1,x_2,\ldots,x_n\}$$ (like salaries of $$n$$ individuals) stored in a database and some subsums of these numbers are made public or just available for persons not eligible to learn the original data.
Demetrovics, János   +2 more
openaire   +3 more sources

Enhanced Data Security of Communication System Using Combined Encryption and Steganography

open access: yesInternational Journal of Interactive Mobile Technologies, 2021
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems.
H. Alrikabi, H. Hazim
semanticscholar   +1 more source

Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption

open access: yesNature Communications, 2021
Existing approaches to sharing of distributed medical data either provide only limited protection of patients’ privacy or sacrifice the accuracy of results.
David Froelicher   +8 more
doaj   +1 more source

A survey on healthcare data security in wireless body area networks

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2021
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard.
Tallat Jabeen, Humaira Ashraf, A. Ullah
semanticscholar   +1 more source

Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

open access: yesIEEE Access, 2021
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users.
Belal Ali, M. Gregory, Shuo Li
semanticscholar   +1 more source

Data Security

open access: yesACM Computing Surveys, 1979
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire   +5 more sources

Data Security and Privacy Protection for Cloud Storage: A Survey

open access: yesIEEE Access, 2020
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy