Results 41 to 50 of about 1,828 (182)

Towards Enhancing Healthcare Data Privacy: Integrating BioClinicalBERT With Polyalphabetic Cipher for Entity Recognition and Anonymization

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu   +3 more
wiley   +1 more source

Security control scheme for cloud data copy based on differential privacy model

open access: yes网络与信息安全学报, 2017
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj   +3 more sources

To Share or Not to Share in Client-Side Encrypted Clouds

open access: yes, 2014
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core   +1 more source

Generative AI for Requirements Engineering: A Systematic Literature Review

open access: yesSoftware: Practice and Experience, Volume 56, Issue 2, Page 141-170, February 2026.
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng   +6 more
wiley   +1 more source

Sigmoid(x): secure distributed network storage [PDF]

open access: yes, 2011
Secure data storage is a serious problem for computer users today, particularly in enterprise environments. As data requirements grow, traditional approaches of secured silos are showing their limitations. They represent a single – or at least, limited –
Goo, Swee Keow   +2 more
core  

Exploring heterogeneity of unreliable machines for p2p backup

open access: yes, 2013
P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as ...
Rzadca, Krzysztof, Skowron, Piotr
core   +1 more source

Introducing and Validating a Minimum Data Set and Core Functionalities for Remote Poststroke Home Monitoring: “A Cross‐Sectional Study”

open access: yesHealth Science Reports, Volume 9, Issue 1, January 2026.
ABSTRACT Background and Aims Stroke is recognized as a significant global health concern. The design and implementation of remote patient monitoring systems necessitate the identification of relevant data elements to effectively address the needs of individuals following a stroke.
Mahbubeh Rezazadeh   +3 more
wiley   +1 more source

Fast and secure laptop backups with encrypted de-duplication [PDF]

open access: yes, 2010
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core   +1 more source

GPUs as Storage System Accelerators

open access: yes, 2012
Massively multicore processors, such as Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditional CPUs.
Al-Kiswany, Samer   +2 more
core   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy