Emerging trends in cloud computing, big data, fog computing, IoT and smart living

A Hosseinian-Far, M Ramachandran… - Technology for smart …, 2018 - Springer
Cloud computing has emerged to address the needs of businesses and to improve the
quantity and quality of data that we can collect and analyse from multiple sources and …

Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

ED Canedo, IN Bandeira, ATS Calazans… - Requirements …, 2023 - Springer
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …

Sharing information online rationally: An observation of user privacy concerns and awareness using serious game

R Fatima, A Yasin, L Liu, J Wang, W Afzal… - Journal of Information …, 2019 - Elsevier
Recent studies have shown that excessive online information disclosure is a major reason of
privacy breach. It makes it easy for social engineers to gather information about their targets …

Analysis of health professional security behaviors in a real clinical setting: An empirical study

JL Fernández-Alemán, A Sánchez-Henarejos… - International journal of …, 2015 - Elsevier
Objective The objective of this paper is to evaluate the security behavior of healthcare
professionals in a real clinical setting. Method Standards, guidelines and recommendations …

A risk management framework for cloud migration decision support

S Islam, S Fenz, E Weippl, H Mouratidis - Journal of Risk and Financial …, 2017 - mdpi.com
Managing risks is of paramount importance for enabling a widespread adoption of cloud
computing. Users need to understand the risks associated with the process of migrating …

Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA

F Lahmar, H Mezni - Soft Computing, 2021 - Springer
With the emergence of cloud computing and to better satisfy users' complex requirements in
front of the huge number of cloud services, these latter may be combined while considering …

Framework of data privacy preservation and location obfuscation in vehicular cloud networks

H Al‐Balasmeh, M Singh… - … and Computation: Practice …, 2022 - Wiley Online Library
The leakage of sensitive data of users and global positioning system location trajectories
from different cloud computation sources have increased in daily lives. This critical problem …

Security-aware intermediate data placement strategy in scientific cloud workflows

W Liu, S Peng, W Du, W Wang, GS Zeng - Knowledge and information …, 2014 - Springer
Massive computation power and storage capacity of cloud computing systems allow
scientists to deploy data-intensive applications without the infrastructure investment, where …

A security requirements modelling language for cloud computing environments

H Mouratidis, S Shei, A Delaney - Software and Systems Modeling, 2020 - Springer
This paper presents a novel security modelling language and a set of original analysis
techniques, for capturing and analysing security requirements for cloud computing …

A framework for security transparency in cloud computing

UM Ismail, S Islam, M Ouedraogo, E Weippl - Future Internet, 2016 - mdpi.com
Individuals and corporate users are persistently considering cloud adoption due to its
significant benefits compared to traditional computing environments. The data and …