Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning

JA Alzubi, OA Alzubi, A Singh… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Industrial cloud computing and Internet of Things have transformed the healthcare industry
with the rapid growth of distributed healthcare data. Security and privacy of healthcare data …

Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology

S Chenthara, K Ahmed, H Wang, F Whittaker, Z Chen - Plos one, 2020 - journals.plos.org
The privacy of Electronic Health Records (EHRs) is facing a major hurdle with outsourcing
private health data in the cloud as there exists danger of leaking health information to …

[PDF][PDF] Mitigating cybersecurity risks in the US healthcare sector

CM Okafor, A Kolade, T Onunka… - International Journal of …, 2023 - academia.edu
The US healthcare's digital transformation yields enhanced care, efficient data management,
and streamlined operations. This qualitative study uses an analytical case study method to …

A Systematic Review of Personal Information Sharing in Smart Cities: Risks, Impacts, and Controls

MI Alabsi, AQ Gill - Journal of the Knowledge Economy, 2024 - Springer
Smart cities aim to deliver smart services that rely on emerging technologies to their users. In
order for users to get the provided services, they need to share their personal information …

Privacy dilemma in healthcare: A review on privacy preserving medical internet of things

NN Thilakarathne, HD Weerasinghe… - 2021 12th …, 2021 - ieeexplore.ieee.org
In recent years, the Medical Internet of Things or well known as MIoT has attracted so much
attentional from researchers, academia for its potential to alleviate the burden on global …

[PDF][PDF] Intelligent Threat Identification System: Implementing Multi-Layer Security Networks in Cloud Environments

RR Talla, A Manikyala, M Nizamuddin… - NEXG AI Review of …, 2021 - researchgate.net
This research investigates using an Intelligent Threat Identification System (ITIS) in
multilayered security networks to defend cloud environments against sophisticated …

Modelos de control de acceso más utilizados en la seguridad de datos médicos

B Campos-Montero, C Rodríguez-Sandoval… - Revista Tecnología en …, 2024 - scielo.sa.cr
El acceso no autorizado a datos sensibles de pacientes es un problema que atenta contra
ellos mismos y la seguridad de las organizaciones dedicadas al servicio de salud, para lo …

Control de accesos en seguridad de la información: Una revisión sistemática de las técnicas actuales

J Pacheco, J Chavez… - Campus, 2023 - portalrevistas.aulavirtualusmp.pe
En el dinámico escenario de la ciberseguridad actual, la gestión efectiva de accesos a
sistemas y datos críticos es fundamental para salvaguardar la integridad y confidencialidad …

Proposta de um framework de compliance à Lei Geral de Proteção a Dados Pessoais (LGPD): um estudo de caso para prevenção a fraude no contexto de Big Data

AP Carvalho - 2021 - rlbea.unb.br
No cenário de produção de dados em massa ainda em expansão a níveis outrora
inimagináveis a proteção à privacidade de dados é um problema que vem ganhando mais …

[HTML][HTML] Modelos de control de acceso más utilizados en la seguridad de datos médicos Access control models most used in medical data security

B Campos-Montero, C Rodríguez-Sandoval… - revistas.tec.ac.cr
El acceso no autorizado a datos sensibles de pacientes es un problema que atenta contra
ellos mismos y la seguridad de las organizaciones dedicadas al servicio de salud, para lo …