A review of secure and privacy-preserving medical data sharing
In the digital healthcare era, it is of the utmost importance to harness medical information
scattered across healthcare institutions to support in-depth data analysis and achieve …
scattered across healthcare institutions to support in-depth data analysis and achieve …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Revocable attribute-based encryption with data integrity in clouds
Cloud computing enables enterprises and individuals to outsource and share their data.
This way, cloud computing eliminates the heavy workload of local information infrastructure …
This way, cloud computing eliminates the heavy workload of local information infrastructure …
Dp-forward: Fine-tuning and inference on language models with differential privacy in forward pass
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-
propagation, safeguarding training data from privacy leakage, particularly membership …
propagation, safeguarding training data from privacy leakage, particularly membership …
Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure
The exponential growth of the Internet of Things (IoT) technologies requires high data
security. Here, data security is very critical as all IoT devices transfer data over the Internet …
security. Here, data security is very critical as all IoT devices transfer data over the Internet …
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
Personal health record (PHR) is an emerging patient-centric model of health information
exchange, which is often outsourced to be stored at a third party, such as cloud providers …
exchange, which is often outsourced to be stored at a third party, such as cloud providers …
Outsourcing the decryption of {ABE} ciphertexts
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
Decentralizing attribute-based encryption
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …
system, any party can become an authority and there is no requirement for any global …
Frequency-tuned salient region detection
Detection of visually salient image regions is useful for applications like object
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …
segmentation, adaptive compression, and object recognition. In this paper, we introduce a …