Security and privacy-preserving challenges of e-health solutions in cloud computing

S Chenthara, K Ahmed, H Wang, F Whittaker - IEEE access, 2019 - ieeexplore.ieee.org
A systematic and comprehensive review of security and privacy-preserving challenges in e-
health solutions indicates various privacy preserving approaches to ensure privacy and …

Computer security

D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …

Attribute-based access control for AWS internet of things and secure industries of the future

S Bhatt, TK Pham, M Gupta, J Benson, J Park… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …

Proposed NIST standard for role-based access control

DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn… - ACM Transactions on …, 2001 - dl.acm.org
In this article we propose a standard for role-based access control (RBAC). Although RBAC
models have received broad support as a generalized approach to access control, and are …

[BOG][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Access control: Policies, models, and mechanisms

P Samarati, SC De Vimercati - … school on foundations of security analysis …, 2000 - Springer
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …

Cybersecurity for digital manufacturing

D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu… - Journal of manufacturing …, 2018 - Elsevier
Digital manufacturing aims to create highly customizable products with higher quality and
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …

Purpose based access control of complex data for privacy protection

JW Byun, E Bertino, N Li - Proceedings of the tenth ACM symposium on …, 2005 - dl.acm.org
As privacy becomes a major concern for both consumers and enterprises, many research
efforts have been devoted to the development of privacy protecting technology. We recently …

[BOG][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

[PDF][PDF] Metamodelling platforms

D Karagiannis, H Kühn - EC-web, 2002 - Citeseer
The state-of-the-art in the area of modelling of organisations is based on fixed metamodels.
Due to rapid changing business requirements the complexity in develo** applications …