Emerging trends in cloud computing, big data, fog computing, IoT and smart living
Cloud computing has emerged to address the needs of businesses and to improve the
quantity and quality of data that we can collect and analyse from multiple sources and …
quantity and quality of data that we can collect and analyse from multiple sources and …
Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …
organizations must guarantee users' privacy by protecting personal data. There are several …
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game
Recent studies have shown that excessive online information disclosure is a major reason of
privacy breach. It makes it easy for social engineers to gather information about their targets …
privacy breach. It makes it easy for social engineers to gather information about their targets …
Analysis of health professional security behaviors in a real clinical setting: An empirical study
JL Fernández-Alemán, A Sánchez-Henarejos… - International journal of …, 2015 - Elsevier
Objective The objective of this paper is to evaluate the security behavior of healthcare
professionals in a real clinical setting. Method Standards, guidelines and recommendations …
professionals in a real clinical setting. Method Standards, guidelines and recommendations …
A risk management framework for cloud migration decision support
Managing risks is of paramount importance for enabling a widespread adoption of cloud
computing. Users need to understand the risks associated with the process of migrating …
computing. Users need to understand the risks associated with the process of migrating …
Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA
F Lahmar, H Mezni - Soft Computing, 2021 - Springer
With the emergence of cloud computing and to better satisfy users' complex requirements in
front of the huge number of cloud services, these latter may be combined while considering …
front of the huge number of cloud services, these latter may be combined while considering …
Framework of data privacy preservation and location obfuscation in vehicular cloud networks
H Al‐Balasmeh, M Singh… - … and Computation: Practice …, 2022 - Wiley Online Library
The leakage of sensitive data of users and global positioning system location trajectories
from different cloud computation sources have increased in daily lives. This critical problem …
from different cloud computation sources have increased in daily lives. This critical problem …
Security-aware intermediate data placement strategy in scientific cloud workflows
W Liu, S Peng, W Du, W Wang, GS Zeng - Knowledge and information …, 2014 - Springer
Massive computation power and storage capacity of cloud computing systems allow
scientists to deploy data-intensive applications without the infrastructure investment, where …
scientists to deploy data-intensive applications without the infrastructure investment, where …
A security requirements modelling language for cloud computing environments
This paper presents a novel security modelling language and a set of original analysis
techniques, for capturing and analysing security requirements for cloud computing …
techniques, for capturing and analysing security requirements for cloud computing …
A framework for security transparency in cloud computing
Individuals and corporate users are persistently considering cloud adoption due to its
significant benefits compared to traditional computing environments. The data and …
significant benefits compared to traditional computing environments. The data and …