[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …
Blockchain-based federated learning technique for privacy preservation and security of smart electronic health records
This study introduces a blockchain-based lightweight encryption strategy with federated
learning to address the scalability and trust concerns of electronic health records (EHR) …
learning to address the scalability and trust concerns of electronic health records (EHR) …
Semantic analysis of blockchain intelligence with proposed agenda for future issues
R Saxena, E Gayathri, L Surya Kumari - International Journal of System …, 2023 - Springer
Integrating blockchain technology with artificial intelligence (AI) ie, blockchain Intelligence
makes an extremely powerful tool that solves many multidimensional problems in several …
makes an extremely powerful tool that solves many multidimensional problems in several …
Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system
Healthcare comprises the largest revenue and data boom markets. Sharing knowledge
about healthcare is crucial for research that can help healthcare providers and patients …
about healthcare is crucial for research that can help healthcare providers and patients …
Machine learning and ontology-based novel semantic document indexing for information retrieval
The goal of information retrieval (IR) systems is to find the contents most closely related to
the user's information needs from a pool of information. However, conventional IR methods …
the user's information needs from a pool of information. However, conventional IR methods …
A security model to protect the isolation of medical data in the cloud using hybrid cryptography
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …
data privately over remote storage via an Internet connection. Medical data is stored in the …
A K-SVD based compressive sensing method for visual chaotic image encryption
The visually secure image encryption scheme is an effective image encryption method,
which embeds an encrypted image into a visual image to realize a secure and secret image …
which embeds an encrypted image into a visual image to realize a secure and secret image …
Multi-level security in healthcare by integrating lattice-based access control and blockchain-based smart contracts system
Access control to patient information has become increasingly important in healthcare
systems. It is vital to enhance the security of healthcare systems to avoid data loss despite …
systems. It is vital to enhance the security of healthcare systems to avoid data loss despite …
[HTML][HTML] IoT-driven blockchain to manage the healthcare supply chain and protect medical records
Healthcare supply chain domain and medical records' management face numerous
challenges that come with new demands, such as customer dissatisfaction, rising healthcare …
challenges that come with new demands, such as customer dissatisfaction, rising healthcare …
Big data handling approach for unauthorized cloud computing access
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …
capabilities and applications have been extended to various areas of life. Cloud computing …