Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dataflow management in the internet of things: Sensing, control, and security
The pervasiveness of the smart Internet of Things (IoTs) enables many electric sensors and
devices to be connected and generates a large amount of dataflow. Compared with …
devices to be connected and generates a large amount of dataflow. Compared with …
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control
Abstract The Internet of Things (IoT) is bringing new ways to collect and analyze data to
develop applications answering or anticipating users' needs. These data may be privacy …
develop applications answering or anticipating users' needs. These data may be privacy …
PrivacyInsight: the next generation privacy dashboard
C Bier, K Kühne, J Beyerer - Annual privacy forum, 2016 - Springer
Transparency is an integral part of European data protection. In particular, the right of access
allows the data subject to verify if his personal data is processed in a lawful manner. The …
allows the data subject to verify if his personal data is processed in a lawful manner. The …
LUCON: Data flow control for message-based IoT systems
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …
exchange of data between services across enterprises. Traditional access and usage …
Data loss prevention based on data-driven usage control
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …
corporate information security. Data loss prevention systems typically try to cope with this …
A comprehensive and holistic knowledge model for cloud privacy protection
A Akremi, M Rouached - The Journal of Supercomputing, 2021 - Springer
Although Cloud computing is gaining popularity by supporting data analysis in an
outsourced and cost-effective way, it brings serious privacy issues when sending the original …
outsourced and cost-effective way, it brings serious privacy issues when sending the original …
An ecosystem and IoT device architecture for building trust in the industrial data space
The most recent and prominent advances in industrial computing include the growing
interconnectivity of cyber-physical devices, as well as the increasing variety of complex …
interconnectivity of cyber-physical devices, as well as the increasing variety of complex …
Data usage control enforcement in distributed systems
F Kelbert, A Pretschner - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Distributed usage control is concerned with how data may or may not be used in distributed
system environments after initial access has been granted. If data flows through a distributed …
system environments after initial access has been granted. If data flows through a distributed …
[PDF][PDF] Challenges and opportunities of cloud computing
In recent years, Cloud Computing has become an emerging technology that gains wide
influence on IT systems. Cloud Computing is a distributed computing model for enabling …
influence on IT systems. Cloud Computing is a distributed computing model for enabling …
Sifter: protecting security-critical kernel modules in Android through attack surface reduction
The Linux kernel is an important part of the Trusted Computing Base (TCB) of a mobile
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …
device using the Android OS, making it attractive to attackers. While all vulnerabilities in the …