• A modal logic for information system security 

      Bai, Yun; Khan, Khaled M. ( Australian Computer Society, Inc. , 2011 , Article)
      As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
    • Access Control Schemes for Implantable Medical Devices: A Survey 

      Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen; Mohamed, Amr ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)
      Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's ...
    • Accountable and privacy-enhanced access control in wireless sensor networks 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ...
    • Blockchain-Based Access Control for Secure Smart Industry Management Systems 

      Kalapaaking, Aditya Pribadi; Khalil, Ibrahim; Rahman, Mohammad Saidur; Bouras, Abdelaziz ( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)
      Smart manufacturing systems involve a large number of interconnected devices resulting in massive data generation. Cloud computing technology has recently gained increasing attention in smart manufacturing systems for ...
    • DVF-fog: Distributed virtual firewall in fog computing based on risk analysis 

      Kamoun-Abid, Ferdaous; Meddeb-Makhlouf, Amel; Zarai, Faouzi; Guizani, Mohsen ( Inderscience Publishers , 2019 , Article)
      To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
    • Effective Collaboration in the Management of Access Control Policies: A Survey of Tools 

      Fernandez, Rachael; Cheng, Peter C.-H.; Nhlabatsi, Armstrong; Khan, Khaled Md.; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article Review)
      Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ...
    • Efficient and Privacy-Preserving Cloud-Based Medical Diagnosis Using an Ensemble Classifier With Inherent Access Control and Micro-Payment 

      Abdelfattah, Sherif; Badr, Mahmoud M.; Mahmoud, Mohamed M. E. A.; Abualsaud, Khalid; Yaacoub, Elias; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      Decision tree (DT) models are widely used in medical applications where the size of the data sets is usually small or medium. Moreover, DT ensemble models are preferred over single DT models because of their higher accuracy ...
    • POKs based secure and energy-efficient access control for implantable medical devices 

      Fu, Chenglong; Du, Xiaojiang; Wu, Longfei; Zeng, Qiang; Mohamed, Amr; ... more authors ( Springer , 2019 , Conference Paper)
      Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical ...