Balancing security and privacy in the digital age: an in-depth analysis of legal and regulatory frameworks impacting cybersecurity practices

MT Nguyen, MQ Tran - International Journal of Intelligent …, 2023 - research.tensorgate.org
In this qualitative research paper, we perform an in-depth examination of the complex
interplay between legal and regulatory frameworks and their impact on cybersecurity …

Achieving security scalability and flexibility using fog-based context-aware access control

ASM Kayes, W Rahayu, P Watters, M Alazab… - Future Generation …, 2020 - Elsevier
In the cyberspace environment, access control is one of the foremost fundamental
safeguards used to prevent unauthorized access and to minimize the impact from security …

Imperceptibility—robustness tradeoff studies for ECG steganography using continuous ant colony optimization

P Ramu, R Swaminathan - Expert Systems with Applications, 2016 - Elsevier
ECG Steganography ensures protection of patient data when ECG signals embedded with
patient data are transmitted over the internet. Steganography algorithms strive to recover the …

Rmind: a tool for cryptographically secure statistical analysis

D Bogdanov, L Kamm, S Laur… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Secure multi-party computation is a practical cryptographic method for processing
confidential data. Research progress has led to its use in privacy-preserving statistical …

Semantic attribute-based access control: A review on current status and future perspectives

H Arshad, C Johansen, O Owe - Journal of Systems Architecture, 2022 - Elsevier
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject,
object, action, and environment) to provide access control. Despite various advantages …

Privacy languages: Are we there yet to enable user controls?

J Zhao, R Binns, M Van Kleek, N Shadbolt - Proceedings of the 25th …, 2016 - dl.acm.org
Privacy protection is one of the most prominent concerns for web users. Despite numerous
efforts, users remain powerless in controlling how their personal information should be used …

Fault tolerance management in IaaS clouds

R Jhawar, V Piuri - … IEEE First AESS European Conference on …, 2012 - ieeexplore.ieee.org
Fault tolerance, reliability and availability in Cloud computing are critical to ensure correct
and continuous system operation also in the presence of failures. In this paper, we present …

SDN-based security enforcement framework for data sharing systems of smart healthcare

Y Meng, Z Huang, G Shen, C Ke - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As novel healthcare paradiagm, smart healthcare can provide more efficient and high quality
medical services for patients. However, smart healthcare needs patients to share their …

Access control for smarter healthcare using policy spaces

CA Ardagna, SDC Di Vimercati, S Foresti… - Computers & …, 2010 - Elsevier
A fundamental requirement for the healthcare industry is that the delivery of care comes first
and nothing should interfere with it. As a consequence, the access control mechanisms used …

Toward privacy-aware task allocation in social sensing-based edge computing systems

D Zhang, Y Ma, XS Hu, D Wang - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the advance in mobile computing, Internet of Things, and ubiquitous wireless
connectivity, social sensing-based edge computing (SSEC) has emerged as a new …