[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …
2018 across the European Union, new legal requirements for the protection of personal data …
A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Link between sustainability and industry 4.0: trends, challenges and new perspectives
The increasing number of studies that underline the relationship between industry 4.0 and
sustainability shows that sustainability is one of the pillars of smart factories. Through a …
sustainability shows that sustainability is one of the pillars of smart factories. Through a …
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
Privacy preserving deep computation model on cloud for big data feature learning
To improve the efficiency of big data feature learning, the paper proposes a privacy
preserving deep computation model by offloading the expensive operations to the cloud …
preserving deep computation model by offloading the expensive operations to the cloud …
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
Kubernetes in IT administration and serverless computing: An empirical study and research challenges
Today's industry has gradually realized the importance of lifting efficiency and saving costs
during the life-cycle of an application. In particular, we see that most of the cloud-based …
during the life-cycle of an application. In particular, we see that most of the cloud-based …
Internet of cloud: Security and privacy issues
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …
which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has …
Cloud computing service models: A comparative study
MU Bokhari, QM Shallal… - 2016 3rd international …, 2016 - ieeexplore.ieee.org
Cloud computing still suffer of many security issues that required the researchers to focus on
it to make the users fully trust on it. In this paper we explain the security issues which …
it to make the users fully trust on it. In this paper we explain the security issues which …