Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Fog computing security: a review of current applications and security solutions
S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …
computing resources on the edges of a network. It can be described as a cloud-like platform …
[PDF][PDF] Impact of controls on data integrity and information systems
S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and
its need increasing every day, there comes an essential responsibility and a requirement of …
its need increasing every day, there comes an essential responsibility and a requirement of …
A survey on access control in the age of internet of things
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …
such as social resources and physical resources, are deeply integrated for different …
An access control model for medical big data based on clustering and risk
R Jiang, S Han, Y Yu, W Ding - Information Sciences, 2023 - Elsevier
Access control has been widely adopted by distributed platforms, and its effectiveness is of
great importance to the quality of services provided by such platforms. However, traditional …
great importance to the quality of services provided by such platforms. However, traditional …
[HTML][HTML] Security and privacy in electronic health records: A systematic literature review
JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
[BOG][B] Handbook of research on modern cryptographic solutions for computer and cyber security
B Gupta, DP Agrawal, S Yamaguchi - 2016 - books.google.com
Internet usage has become a facet of everyday life, especially as more technological
advances have made it easier to connect to the web from virtually anywhere in the …
advances have made it easier to connect to the web from virtually anywhere in the …
Discovering smart home internet of things privacy norms using contextual integrity
N Apthorpe, Y Shvartzshnaider, A Mathur… - Proceedings of the …, 2018 - dl.acm.org
The proliferation of Internet of Things (IoT) devices for consumer" smart" homes raises
concerns about user privacy. We present a survey method based on the Contextual Integrity …
concerns about user privacy. We present a survey method based on the Contextual Integrity …
Multi-access edge computing architecture, data security and privacy: A review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …
provide computation, storage, and networking capabilities at the edge of the network in …