Results 1 to 10 of about 359,485 (124)

ENHANCED AUTHORIZATION FOR SECURE MANAGEMENT OF SENSITIVE DATA IN HYBRID APPLICATIONS

open access: yesСистеми управління навігації та зв'язку Збірник наукових праць, 2023
Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers who seek unauthorized access to this data. Traditional approaches to authorization may not be sufficient to protect sensitive data from such attacks.
G. Golovko, D. Iievliev
semanticscholar   +1 more source

ZeroTrustBlock: Enhancing Security, Privacy, and Interoperability of Sensitive Data through ZeroTrust Permissioned Blockchain

open access: yesBig Data and Cognitive Computing, 2023
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders—however, traditional health data management mechanisms present interoperability, security, and privacy ...
Pratik Thantharate, Anurag Thantharate
semanticscholar   +1 more source

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data

open access: yesIEEE Access, 2018
As many services have been subcontracted to the cloud, data in such services (i.e., management applications, signal processing, and so on) are stored on cloud in encrypted form for protecting user private information.
Yanguo Peng   +4 more
doaj   +1 more source

Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions [PDF]

open access: yesITM Web of Conferences
Security risks in modern multi-cloud environments include data compromise, unauthorized pain points, and increased data leakage risk. We note that while existing security frameworks such as security standards may be useful: they fail to deal with ...
Dandu Varalakshmi   +5 more
doaj   +1 more source

Privacy Preservation of Sensitive Data using Polymorphic Encryption and Cryptographic Techniques

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2019
The compilation and analysis of health records on a big data scale is becoming an essential approach to understand problematical diseases. In order to gain new insights it is important that researchers can cooperate: they will have to access each other's

semanticscholar   +1 more source

EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks

open access: yesIEEE Access, 2019
Advanced metering infrastructure (AMI) networks allow the data collection of consumers' fine-grained power consumption data (PCD) to perform real-time monitoring and energy management.
Ahmad Alsharif   +3 more
doaj   +1 more source

Wireless Sensor Network Security for Smart Home IoT Systems

open access: yesProceedings of the 7th International Conference of Control, Dynamic Systems, and Robotics (CDSR'20), 2020
– In recent years, the so-called Internet of Things (IoT) has emerged as a transformative trend for both commercial and consumer-grade applications. The IoT includes a mesh of wirelessly networked devices with embedded sensors that monitor physical and ...
A. Carranza   +4 more
semanticscholar   +1 more source

Intelligent XML Tag Classification Techniques for XML Encryption Improvement [PDF]

open access: yes, 2011
Flexibility, friendliness, and adaptability have been key components to use XML to exchange information across different networks providing the needed common syntax for various messaging systems. However excess usage of XML as a communication medium shed
Ammari, Faisal   +2 more
core   +1 more source

HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree [PDF]

open access: yes, 2011
Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer ...
A. Ahmed   +25 more
core   +2 more sources

Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network

open access: yesJournal of Supercomputing, 2023
The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things (IoT) where the Things collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH).
R. Bhan   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy