Results 41 to 50 of about 1,828 (182)
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
Security control scheme for cloud data copy based on differential privacy model
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj +3 more sources
To Share or Not to Share in Client-Side Encrypted Clouds
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core +1 more source
Generative AI for Requirements Engineering: A Systematic Literature Review
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng +6 more
wiley +1 more source
Sigmoid(x): secure distributed network storage [PDF]
Secure data storage is a serious problem for computer users today, particularly in enterprise environments. As data requirements grow, traditional approaches of secured silos are showing their limitations. They represent a single – or at least, limited –
Goo, Swee Keow +2 more
core
Exploring heterogeneity of unreliable machines for p2p backup
P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as ...
Rzadca, Krzysztof, Skowron, Piotr
core +1 more source
ABSTRACT Background and Aims Stroke is recognized as a significant global health concern. The design and implementation of remote patient monitoring systems necessitate the identification of relevant data elements to effectively address the needs of individuals following a stroke.
Mahbubeh Rezazadeh +3 more
wiley +1 more source
Fast and secure laptop backups with encrypted de-duplication [PDF]
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core +1 more source
GPUs as Storage System Accelerators
Massively multicore processors, such as Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditional CPUs.
Al-Kiswany, Samer +2 more
core +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source

