Search
Now showing items 1-10 of 21
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
CloudSafe: A tool for an automated security analysis for cloud computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
DQN based Blockchain Data Storage in Resource-constrained IoT System
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
Watermarking: A review of software and hardware techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
(
Association for Computing Machinery
, 2021 , Conference Paper)
Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...
Empowering users of cloud computing on data confidentiality
(
IEEE
, 2014 , Conference Paper)
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...