Results 71 to 80 of about 25,084,029 (287)
Secure Data Processing in the Cloud [PDF]
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám+7 more
openaire +3 more sources
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang+4 more
semanticscholar +1 more source
Computing on Masked Data to improve the Security of Big Data
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users.
Gadepally, Vijay+6 more
core +1 more source
The rapid development of location-based social networks (LBSNs) produces the increasing number of check-in records and corresponding heterogeneous information which bring big challenges of points-of-interest (POIs) recommendation in our daily lives.
Bin Xia+4 more
doaj +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Group recommendation based on hybrid trust metric
Group recommendation is a special service type which has the ability to satisfy a group’s common interest and find the preferred items for group users. Deep mining of trust relationship between group members can contribute to the improvement of accuracy ...
Haiyan Wang, Dongdong Chen, Jiawei Zhang
doaj +1 more source
Understanding the genetic and environmental risk factors for serious bacterial infections in ageing populations remains incomplete. Utilising the UK Biobank (UKB), a prospective cohort study of 500,000 adults aged 40–69 years at recruitment (2006–2010 ...
Bridget Hilton+7 more
doaj +1 more source
Secure contexts for confidential data [PDF]
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available.
BOSSI A.+3 more
openaire +4 more sources
Making the Distribution Subsystem Secure [PDF]
This report presents how the Distribution Subsystem is made secure. A set of different security threats to a shared data programming system are identifed.
Brand, Per+2 more
core +1 more source
Security policy refinement using data integration: a position paper.
In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level ...
Craven, R+4 more
core +1 more source