Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …

Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

[PDF][PDF] Impact of controls on data integrity and information systems

S Duggineni - Science and Technology, 2023 - researchgate.net
Data has changed and revolutionized the world around us. With the amount of data use and
its need increasing every day, there comes an essential responsibility and a requirement of …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

An access control model for medical big data based on clustering and risk

R Jiang, S Han, Y Yu, W Ding - Information Sciences, 2023 - Elsevier
Access control has been widely adopted by distributed platforms, and its effectiveness is of
great importance to the quality of services provided by such platforms. However, traditional …

[HTML][HTML] Security and privacy in electronic health records: A systematic literature review

JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …

Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

[BOG][B] Handbook of research on modern cryptographic solutions for computer and cyber security

B Gupta, DP Agrawal, S Yamaguchi - 2016 - books.google.com
Internet usage has become a facet of everyday life, especially as more technological
advances have made it easier to connect to the web from virtually anywhere in the …

Discovering smart home internet of things privacy norms using contextual integrity

N Apthorpe, Y Shvartzshnaider, A Mathur… - Proceedings of the …, 2018 - dl.acm.org
The proliferation of Internet of Things (IoT) devices for consumer" smart" homes raises
concerns about user privacy. We present a survey method based on the Contextual Integrity …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - Ieee Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …