Web 3.0: governance, risks and safeguards

R Bruwer, H Jacobus, R Rudman - 2015 - scholar.sun.ac.za
Many organisations consider technology as a significant asset to generate income and
control cost. The Web is recognised as the fastest growing publication medium of all time …

Integration of a secure type-2 fuzzy ontology with a multi-agent platform: a proposal to automate the personalized flight ticket booking domain

AC Bukhari, YG Kim - Information Sciences, 2012 - Elsevier
Recently, several fuzzy ontology-based solutions have been proposed in the domain of web-
based applications to reduce the manual work load of daily activities. However, because of …

Pseudonymization with metadata encryption for privacy-preserving searchable documents

J Heurix, M Karlinger… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The average costs of data leakage are steadily on the rise. As a consequence, several data
security and access control mechanisms have been introduced, ranging from data …

On the efficiency of secure XML broadcasting

HK Ko, MJ Kim, SK Lee - Information Sciences, 2007 - Elsevier
Secure broadcasting of web documents is becoming a crucial requirement for many web-
based applications. Under the broadcast document dissemination strategy, a web document …

A survey on querying encrypted XML documents for databases as a service

O Ünay, Tİ Gündem - ACM SIGMOD Record, 2008 - dl.acm.org
" Database as a service" paradigm has gained a lot of interest in recent years. This has
raised questions about the security of data in the servers. Firms outsourcing their XML …

A new structure and access mechanism for secure and efficient XML data broadcast in mobile wireless networks

B Safabahar, M Mirabi - Journal of Systems and Software, 2017 - Elsevier
Recently, the use of XML for data broadcasting in mobile wireless networks has gained
many attentions. One of the most essential requirements for such networks is data …

An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels

M Shokri, M Mirabi - The Journal of Supercomputing, 2019 - Springer
In mobile wireless broadcast networks, XML data is encrypted before it is sent over the
broadcast channel in order to ensure the confidentiality of XML data. In these networks …

PERiMETER–pseudonymization and personal metadata encryption for privacy-preserving searchable documents

J Heurix, M Karlinger, T Neubauer - Health Systems, 2012 - Taylor & Francis
The average costs of data leakage are steadily on the rise. Especially in healthcare, the
disclosure of sensitive information may have unfavorable consequences for the patient. As a …

A hybrid approach integrating encryption and pseudonymization for protecting electronic health records

J Heurix, M Karlinger, M Schrefl… - Proceedings of the Eighth …, 2011 - actapress.com
ABSTRACT Federated Health Information Systems (FHIS) integrate autonomous information
systems of participating health care providers to facilitate the exchange of Electronic Health …

Developing an efficient query system for encrypted XML documents

TK Chang, GH Hwang - Journal of Systems and Software, 2011 - Elsevier
XQuery is a query and functional programming language that is designed for querying the
data in XML documents. This paper addresses how to efficiently query encrypted XML …