Results 21 to 30 of about 3,206,915 (290)

On the Need for a General REST-Security Framework

open access: yesFuture Internet, 2019
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept.
Luigi Lo Iacono   +2 more
doaj   +1 more source

Securing a Local Training Dataset Size in Federated Learning

open access: yesIEEE Access, 2022
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin   +3 more
doaj   +1 more source

Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network

open access: yesIEEE Access, 2018
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang   +5 more
doaj   +1 more source

Security of graph data

open access: yesProceedings of the 4th ACM conference on Data and application security and privacy, 2014
Use of graph-structured data models is on the rise - in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing ...
Arshad, Muhammad U.   +4 more
openaire   +3 more sources

Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]

open access: yes, 2010
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C.   +3 more
core   +1 more source

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]

open access: yes, 2014
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core   +2 more sources

Designing privacy for scalable electronic healthcare linkage [PDF]

open access: yes, 2009
A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this.
Ajayi, O.   +3 more
core   +2 more sources

Multi-Features Refinement and Aggregation for Medical Brain Segmentation

open access: yesIEEE Access, 2020
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu   +4 more
doaj   +1 more source

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

GLF-NET: Global and Local Dynamic Feature Fusion Network for Real-Time Steel Strip Surface Defect Detection

open access: yesIEEE Access
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy