Multilevel secure data stream processing: Architecture and implementation

R Adaikkalavan, X Xie, I Ray - Journal of Computer Security, 2012 - journals.sagepub.com
… the need for a multilevel secure continuous query processing system. Each multilevel …
Users are required to bind input data sources with the stream schemas explicitly. This is not …

Secure data sequence query framework based on multiple fogs

K Gu, N Wu, B Yin, W Jia - IEEE Transactions on Emerging …, 2019 - ieeexplore.ieee.org
… a secure data sequence query framework based on multiple fog … security in the process
of data usage, data acquisition and data transmission, including authenticating data sources, …

Secure and efficient health data management through multiple watermarking on medical images

A Giakoumaki, S Pavlopoulos, D Koutsouris - Medical and Biological …, 2006 - Springer
… On the other hand, our multiple watermarking scheme simultaneously addresses a range
of health data management issues having different characteristics and requirements. …

Cyber security data sources for dynamic network research

AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
data sources a single log file represents 24 hours of contiguously collected data from multiple
data sources (… For the data sets we have released and associated analysis, we have consid…

Multilevel secure data stream processing

R Adaikkalavan, I Ray, X Xie - Data and Applications Security and Privacy …, 2011 - Springer
data applications where data sources, data streams, queries, and other components in
DSMS are assigned with security … In order to accelerate processing rates, we explore different

A multipath routing approach for secure data delivery

W Lou, Y Fang - … for Network-Centric Operations: Creating the …, 2001 - ieeexplore.ieee.org
… scheme is popularly used in secret key management [1],[8]. In … secure message to be
transmitted, then we develop a distributed multipath routing algorithm to find the desired multiple

Secure data deduplication

MW Storer, K Greenan, DDE Long… - … on Storage security and …, 2008 - dl.acm.org
… to secure deduplication: authenticated and anonymous. While the two models are similar,
they each offer slightly different security … a file, the map entry of a different file accessible by the …

Secure Data Sharing in Multi-Cloud Environments: A Cryptographic Framework for Healthcare Systems

DR Chirra - Revista de Inteligencia Artificial en Medicina, 2024 - redcrevistas.com
… digital health transformation, secure data sharing across multi-… promising avenues for secure
data sharing in multi-cloud … be trained on decentralized data sources without data sharing, …

ENHANCING DATA PRIVACY AND SECURITY IN MULTI CLOUD ENVIRONMENTS

ME Hossain, MF Kabir, A Al Noman… - BULLET: Jurnal …, 2022 - journal.mediapublikasi.id
… for secure data sharing in Multi Clouds environments. It combines three different protection
… This work helps the continuous process of creating secure security solutions to meet the …

Detection of duplicated data with minimum overhead and secure data transmission for sensor big data

S Beulah, FR Dhanaseelan - Cluster Computing, 2019 - Springer
… or analysis which requires end-to-end security for the data. A … similar data with light-weight
process using pattern analysis and … This process distributes the security process in multiple