A Systematic Literature Map** on Using Blockchain Technology in Identity Management
TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …
leveraging its features. Traditional identity management systems have many issues …
[HTML][HTML] An assurance process for Big Data trustworthiness
Modern (industrial) domains are based on large digital ecosystems where huge amounts of
data and information need to be collected, shared, and analyzed by multiple actors working …
data and information need to be collected, shared, and analyzed by multiple actors working …
Secure cloud data storage solution with better data accessibility and time efficiency
Sažetak The environment of cloud computing provides several advantages and a variety of
data storage models, which entirely frees users from the vexing processes of storage …
data storage models, which entirely frees users from the vexing processes of storage …
[Retracted] The Application of “Internet+” in the Ageing Adaptation of Elderly People with Disabilities at Home
H Juan, L Li, M Jiasong, Z Lifang… - Journal of …, 2021 - Wiley Online Library
This paper focuses on the role of the Internet in empowering social work to intervene in
ageing‐in‐place services for the disabled elderly in terms of time, space, and resources …
ageing‐in‐place services for the disabled elderly in terms of time, space, and resources …
PPAC-CDW: A Privacy-Preserving Access Control Scheme with Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse
S Fugkeaw, L Hak - IEEE Access, 2024 - ieeexplore.ieee.org
Achieving privacy-preserving analytical query with fine-grained access control for cloud-
based data warehouse (CDW) through the use of online analytical processing (OLAP) tool is …
based data warehouse (CDW) through the use of online analytical processing (OLAP) tool is …
Bioinspired FHE model with recursive revokable selective access control for attribute-based privacy preservation
Access control and authentication are two aspects of cyber-physical systems that improve
their usability, security and accessibility. Along with these aspects, data privacy and security …
their usability, security and accessibility. Along with these aspects, data privacy and security …
[PDF][PDF] BLA2C2: Design of a novel blockchain-based light-weight authentication & access control layer for cloud deployments
S Khare, A Badholia - International Journal on Recent and Innovation …, 2023 - academia.edu
Cloud deployments are consistently under attack, from both internal and external
adversaries. These attacks include, but are not limited to brute force, masquerading …
adversaries. These attacks include, but are not limited to brute force, masquerading …
A Survey on Sharing Cloud Data Securely with Encrypted Indexing and User Identity Verification
K Karthik, M Kaviya, K Keerthana… - 2023 2nd …, 2023 - ieeexplore.ieee.org
With the increasing popularity of cloud storage services, securing external information and
ensuring the privacy of data stored on the cloud is becoming a crucial task. The use of …
ensuring the privacy of data stored on the cloud is becoming a crucial task. The use of …
Multilevel Access Control model for highly Scalable Cloud deployments with Contextual extensions
Effective access control is crucial for modern cloud deployments. Common methods like
Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Mandatory …
Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Mandatory …
ASSURANCE-AWARE 5G EDGE-CLOUD ARCHITECTURES FOR INTENSIVE DATA ANALYTICS
F Berto - 2024 - air.unimi.it
Modern data-intensive applications are increasingly demanding in terms of non-functional
properties such as performance, latency, security, and privacy. In order to achieve such non …
properties such as performance, latency, security, and privacy. In order to achieve such non …