بحث بسيط
السجلات المعروضة 1 -- 3 من 3
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
(
Association for Computing Machinery
, 2021 , Conference Paper)
Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...