Cybersecurity in digital transformation applications: analysis of past research and future directions
Z Belkhamza - ICCWS 2023 18th International Conference on …, 2023 - books.google.com
The term digital is often used to indicate the changes occurring in today's world, generally
referred to as a cyberphysical system, driven by the rapid adoption of digital technologies …
referred to as a cyberphysical system, driven by the rapid adoption of digital technologies …
Creating of a General Purpose Language for the Construction of Dynamic Reports
In digital environment, generating reports is an integral part of any business, and therefore
there is a huge need for a tool for creating complex adaptive reports in investment …
there is a huge need for a tool for creating complex adaptive reports in investment …
Towards a Patient-Centered Virtual Hospital Ecosystem: A Fine Grained VHealth-AC Model for Hospitals' Legacy Information Systems
SA Alsalamah, S AlSalamah… - 2022 IEEE Intl Conf …, 2022 - ieeexplore.ieee.org
Virtual hospitals empower traditional hospitals to deliver more accessible, affordable, and
comprehensive patient-centered (PC) care services. However, traditional hospitals' legacy …
comprehensive patient-centered (PC) care services. However, traditional hospitals' legacy …
YUCML-An usage control policy language for end-to-end data sharing
C Li, J Li, R Wang, R Li, C Wang - … International Conference on …, 2023 - ieeexplore.ieee.org
In today's interconnected world, securely sharing data between devices and systems is
crucial. End-to-end big data sharing enables seamless communication and collaboration …
crucial. End-to-end big data sharing enables seamless communication and collaboration …
Integrated Security for IoT: Methodologies and Certification for Collaborative Smart Devices
OH Glanville - 2024 - webthesis.biblio.polito.it
The Internet of Things (IoT) encompasses technologies that include devices with
computational capabilities, software, and other components that connect and exchange data …
computational capabilities, software, and other components that connect and exchange data …
[PDF][PDF] KG Usage Control Policy Framework
Rule 2. A person is obliged to deregister their old address within three days of changing
their place of residence, or of leaving the country. Rule 3. Tourists in Austria are exempt from …
their place of residence, or of leaving the country. Rule 3. Tourists in Austria are exempt from …
[PDF][PDF] A Policy Framework for Usage Control
I Akaichi - users.ics.forth.gr
▪ Rule 2. A person is obliged to deregister their old address within three days of changing
their place of residence, or of leaving the country.▪ Rule 3. Tourists in Austria are exempt …
their place of residence, or of leaving the country.▪ Rule 3. Tourists in Austria are exempt …