[HTML][HTML] A blockchain framework for patient-centered health records and exchange (HealthChain): evaluation and proof-of-concept study
Background Blockchain has the potential to disrupt the current modes of patient data access,
accumulation, contribution, exchange, and control. Using interoperability standards, smart …
accumulation, contribution, exchange, and control. Using interoperability standards, smart …
Proxy re-encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
A digital twin-based privacy enhancement mechanism for the automotive industry
V Damjanovic-Behrendt - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper discusses a Digital Twin demonstrator for privacy enhancement in the automotive
industry. Here, the Digital Twin demonstrator is presented as a method for the design and …
industry. Here, the Digital Twin demonstrator is presented as a method for the design and …
BlindIdM: A privacy-preserving approach for identity management as a service
Identity management is an almost indispensable component of today's organizations and
companies, as it plays a key role in authentication and access control; however, at the same …
companies, as it plays a key role in authentication and access control; however, at the same …
Access control as a service for the Cloud
Cloud computing has become the focus of attention in the computing industry. However,
security concerns still impede the widespread adoption of this technology. Most enterprises …
security concerns still impede the widespread adoption of this technology. Most enterprises …
Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security
and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct …
and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct …
Federated identity management and interoperability for heterogeneous cloud platform ecosystems
N Selvanathan, D Jayakody… - Proceedings of the 14th …, 2019 - dl.acm.org
This paper describes an approach to overcome the interoperability challenges related to
identity management systems supporting cross-collaboration between heterogeneous …
identity management systems supporting cross-collaboration between heterogeneous …
[PDF][PDF] An Overview of Cloud Identity Management-Models.
B Zwattendorfer, T Zefferer, K Stranacher - WEBIST (1), 2014 - scitepress.org
Unique identification and secure authentication are essential processes in various areas of
application, eg in e-Government, e-Health, or e-Business. During the past years several …
application, eg in e-Government, e-Health, or e-Business. During the past years several …
PRIMA: Privacy-preserving identity and access management at internet-scale
The management of identities on the Internet has evolved from the traditional approach
(where each service provider stores and manages identities) to a federated identity …
(where each service provider stores and manages identities) to a federated identity …
A scalable multilabel‐based access control as a service for the cloud (SMBACaaS)
Cloud computing is a shared pool area of computing resources, which might be accessed
from anywhere and simply by just about anyone. The cloud's invaluable features, such as …
from anywhere and simply by just about anyone. The cloud's invaluable features, such as …