Balancing security and privacy in the digital age: an in-depth analysis of legal and regulatory frameworks impacting cybersecurity practices
MT Nguyen, MQ Tran - International Journal of Intelligent …, 2023 - research.tensorgate.org
In this qualitative research paper, we perform an in-depth examination of the complex
interplay between legal and regulatory frameworks and their impact on cybersecurity …
interplay between legal and regulatory frameworks and their impact on cybersecurity …
Achieving security scalability and flexibility using fog-based context-aware access control
In the cyberspace environment, access control is one of the foremost fundamental
safeguards used to prevent unauthorized access and to minimize the impact from security …
safeguards used to prevent unauthorized access and to minimize the impact from security …
Imperceptibility—robustness tradeoff studies for ECG steganography using continuous ant colony optimization
P Ramu, R Swaminathan - Expert Systems with Applications, 2016 - Elsevier
ECG Steganography ensures protection of patient data when ECG signals embedded with
patient data are transmitted over the internet. Steganography algorithms strive to recover the …
patient data are transmitted over the internet. Steganography algorithms strive to recover the …
Rmind: a tool for cryptographically secure statistical analysis
Secure multi-party computation is a practical cryptographic method for processing
confidential data. Research progress has led to its use in privacy-preserving statistical …
confidential data. Research progress has led to its use in privacy-preserving statistical …
Semantic attribute-based access control: A review on current status and future perspectives
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject,
object, action, and environment) to provide access control. Despite various advantages …
object, action, and environment) to provide access control. Despite various advantages …
Privacy languages: Are we there yet to enable user controls?
Privacy protection is one of the most prominent concerns for web users. Despite numerous
efforts, users remain powerless in controlling how their personal information should be used …
efforts, users remain powerless in controlling how their personal information should be used …
Fault tolerance management in IaaS clouds
Fault tolerance, reliability and availability in Cloud computing are critical to ensure correct
and continuous system operation also in the presence of failures. In this paper, we present …
and continuous system operation also in the presence of failures. In this paper, we present …
SDN-based security enforcement framework for data sharing systems of smart healthcare
Y Meng, Z Huang, G Shen, C Ke - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As novel healthcare paradiagm, smart healthcare can provide more efficient and high quality
medical services for patients. However, smart healthcare needs patients to share their …
medical services for patients. However, smart healthcare needs patients to share their …
Access control for smarter healthcare using policy spaces
A fundamental requirement for the healthcare industry is that the delivery of care comes first
and nothing should interfere with it. As a consequence, the access control mechanisms used …
and nothing should interfere with it. As a consequence, the access control mechanisms used …
Toward privacy-aware task allocation in social sensing-based edge computing systems
With the advance in mobile computing, Internet of Things, and ubiquitous wireless
connectivity, social sensing-based edge computing (SSEC) has emerged as a new …
connectivity, social sensing-based edge computing (SSEC) has emerged as a new …