Information systems security research agenda: Exploring the gap between research and practice
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …
The literature review consists of three parts: First, we perform topic modeling of major …
A comprehensive survey of v2x cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …
existing transport systems by enabling increased connectivity and driving autonomy levels …
Security by design for big data frameworks over cloud computing
FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
Future smart connected communities to fight covid-19 outbreak
Abstract Internet of Things (IoT) has grown rapidly in the last decade and continues to
develop in terms of dimension and complexity, offering a wide range of devices to support a …
develop in terms of dimension and complexity, offering a wide range of devices to support a …
Attribute-based access control for AWS internet of things and secure industries of the future
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …
Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial IoT healthcare
The expeditious development in cloud-enabled industrial Internet of Things (IIoT) healthcare
has significantly reduced the costs to monitor and protect people at home while notably …
has significantly reduced the costs to monitor and protect people at home while notably …
Big data resource management & networks: Taxonomy, survey, and future directions
FM Awaysheh, M Alazab, S Garg… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the
broader computer network and communication community. For several years, dedicated …
broader computer network and communication community. For several years, dedicated …
Smart city applications to promote citizen participation in city management and governance: A systematic review
D Bastos, A Fernández-Caballero, A Pereira… - Informatics, 2022 - mdpi.com
This systematic review aimed to provide a comprehensive view of (1) the purposes of
research studies using smart city infrastructures to promote citizen participation in the cities' …
research studies using smart city infrastructures to promote citizen participation in the cities' …
Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system
People can store their data on servers in cloud computing and allow public users to access
data via data centers. One of the most difficult tasks is to provide security for the access …
data via data centers. One of the most difficult tasks is to provide security for the access …