Results 71 to 80 of about 25,084,029 (287)

Secure Data Processing in the Cloud [PDF]

open access: yes, 2018
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám   +7 more
openaire   +3 more sources

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

open access: yesIEEE Access, 2018
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang   +4 more
semanticscholar   +1 more source

Computing on Masked Data to improve the Security of Big Data

open access: yes, 2015
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users.
Gadepally, Vijay   +6 more
core   +1 more source

MTPR: A Multi-Task Learning Based POI Recommendation Considering Temporal Check-Ins and Geographical Locations

open access: yesApplied Sciences, 2020
The rapid development of location-based social networks (LBSNs) produces the increasing number of check-in records and corresponding heterogeneous information which bring big challenges of points-of-interest (POIs) recommendation in our daily lives.
Bin Xia   +4 more
doaj   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

Group recommendation based on hybrid trust metric

open access: yesAutomatika, 2020
Group recommendation is a special service type which has the ability to satisfy a group’s common interest and find the preferred items for group users. Deep mining of trust relationship between group members can contribute to the improvement of accuracy ...
Haiyan Wang, Dongdong Chen, Jiawei Zhang
doaj   +1 more source

Laboratory diagnosed microbial infection in English UK Biobank participants in comparison to the general population

open access: yesScientific Reports, 2023
Understanding the genetic and environmental risk factors for serious bacterial infections in ageing populations remains incomplete. Utilising the UK Biobank (UKB), a prospective cohort study of 500,000 adults aged 40–69 years at recruitment (2006–2010 ...
Bridget Hilton   +7 more
doaj   +1 more source

Secure contexts for confidential data [PDF]

open access: yes16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2004
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available.
BOSSI A.   +3 more
openaire   +4 more sources

Making the Distribution Subsystem Secure [PDF]

open access: yes, 2004
This report presents how the Distribution Subsystem is made secure. A set of different security threats to a shared data programming system are identifed.
Brand, Per   +2 more
core   +1 more source

Security policy refinement using data integration: a position paper.

open access: yes, 2009
In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level ...
Craven, R   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy