Methods and tools for policy analysis
AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …
technology especially for present and future systems characterized by large-scale systems …
Efficient privacy-preserving spatial range query over outsourced encrypted data
With the rapid development of Location-Based Services (LBS), a large number of LBS
providers outsource spatial data to cloud servers to reduce their high computational and …
providers outsource spatial data to cloud servers to reduce their high computational and …
Enabling efficient spatial keyword queries on encrypted data with strong security guarantees
Structured Encryption (STE), which allows a server to provide secure search services on
encrypted data structures, has been widely investigated in recent years. To meet expressive …
encrypted data structures, has been widely investigated in recent years. To meet expressive …
FOCUS: A fog computing-based security system for the Internet of Things
S Alharbi, P Rodriguez, R Maharaja… - 2018 15th IEEE …, 2018 - ieeexplore.ieee.org
As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with
regard to the security and privacy of the IoT. Cyber attacks such as man-in-the-middle and …
regard to the security and privacy of the IoT. Cyber attacks such as man-in-the-middle and …
[HTML][HTML] A secure data privacy preservation for on-demand cloud service
D Chandramohan, T Vengattaraman… - Journal of King Saud …, 2017 - Elsevier
This paper spotlights privacy and its obfuscation issues of intellectual, confidential
information owned by insurance and finance sectors. Privacy risk in business era if …
information owned by insurance and finance sectors. Privacy risk in business era if …
A hybrid fog-cloud approach for securing the Internet of Things
R Maharaja, P Iyer, Z Ye - Cluster Computing, 2020 - Springer
Abstract As the Internet of Things (IoT) continues to grow, there arises concerns and
challenges with regard to the security and privacy of the IoT. Malicious attacks such as man …
challenges with regard to the security and privacy of the IoT. Malicious attacks such as man …
An architecture for data security in cloud computing
M Sugumaran, BB Murugan… - 2014 World Congress on …, 2014 - ieeexplore.ieee.org
Cloud computing is a more flexible, cost effective and proven delivery platform for providing
business or consumer services over the Internet. Cloud computing supports distributed …
business or consumer services over the Internet. Cloud computing supports distributed …
Methods and apparatus to configure virtual private mobile networks to reduce latency
Methods and apparatus to configure virtual private mobile networks for latency are
disclosed. A disclosed example method includes provisioning logically a virtual private …
disclosed. A disclosed example method includes provisioning logically a virtual private …
A decentralized cloud firewall framework with resources provisioning cost optimization
Cloud computing is becoming popular as the next infrastructure of computing platform.
Despite the promising model and hype surrounding, security has become the major concern …
Despite the promising model and hype surrounding, security has become the major concern …
Efficient and Privacy-Preserving Encode-Based Range Query over Encrypted Cloud Data
Y Liang, J Ma, Y Miao, Y Su… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Privacy-preserving range query, which allows the server to implement secure and efficient
range query on encrypted data, has been widely studied in recent years. Existing privacy …
range query on encrypted data, has been widely studied in recent years. Existing privacy …