Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Semantic attribute-based access control: A review on current status and future perspectives
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject,
object, action, and environment) to provide access control. Despite various advantages …
object, action, and environment) to provide access control. Despite various advantages …
Achieving security scalability and flexibility using fog-based context-aware access control
In the cyberspace environment, access control is one of the foremost fundamental
safeguards used to prevent unauthorized access and to minimize the impact from security …
safeguards used to prevent unauthorized access and to minimize the impact from security …
Imperceptibility—robustness tradeoff studies for ECG steganography using continuous ant colony optimization
P Ramu, R Swaminathan - Expert Systems with Applications, 2016 - Elsevier
ECG Steganography ensures protection of patient data when ECG signals embedded with
patient data are transmitted over the internet. Steganography algorithms strive to recover the …
patient data are transmitted over the internet. Steganography algorithms strive to recover the …
Rmind: a tool for cryptographically secure statistical analysis
Secure multi-party computation is a practical cryptographic method for processing
confidential data. Research progress has led to its use in privacy-preserving statistical …
confidential data. Research progress has led to its use in privacy-preserving statistical …
Privacy languages: Are we there yet to enable user controls?
Privacy protection is one of the most prominent concerns for web users. Despite numerous
efforts, users remain powerless in controlling how their personal information should be used …
efforts, users remain powerless in controlling how their personal information should be used …
SDN-based security enforcement framework for data sharing systems of smart healthcare
Y Meng, Z Huang, G Shen, C Ke - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As novel healthcare paradiagm, smart healthcare can provide more efficient and high quality
medical services for patients. However, smart healthcare needs patients to share their …
medical services for patients. However, smart healthcare needs patients to share their …
Fault tolerance management in IaaS clouds
Fault tolerance, reliability and availability in Cloud computing are critical to ensure correct
and continuous system operation also in the presence of failures. In this paper, we present …
and continuous system operation also in the presence of failures. In this paper, we present …
Access control for smarter healthcare using policy spaces
A fundamental requirement for the healthcare industry is that the delivery of care comes first
and nothing should interfere with it. As a consequence, the access control mechanisms used …
and nothing should interfere with it. As a consequence, the access control mechanisms used …
Concepts and languages for privacy-preserving attribute-based authentication
Existing cryptographic realizations of privacy-friendly authentication mechanisms such as
anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group …
anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group …
Toward privacy-aware task allocation in social sensing-based edge computing systems
With the advance in mobile computing, Internet of Things, and ubiquitous wireless
connectivity, social sensing-based edge computing (SSEC) has emerged as a new …
connectivity, social sensing-based edge computing (SSEC) has emerged as a new …