نتایج جستجو برای: secure information sharing
تعداد نتایج: 1254543 فیلتر نتایج به سال:
BACKGROUND In biomedical research, data sharing and information exchange are very important for improving quality of care, accelerating discovery, and promoting the meaningful secondary use of clinical data. A big concern in biomedical data sharing is the protection of patient privacy because inappropriate information leakage can put patient privacy at risk. METHODS In this study, we deployed...
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...
This paper presents the various secure data sharing techniques in public clouds. A public cloud allows resources such as applications and storage to be accessible to the public over the internet. Due to the benefits of cloud storage, there has been a growing trend to use the public cloud for secure data sharing and storage. The public cloud storage model should solve the critical issue of data ...
We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
Information sharing in vehicular networks has great potential for the future Internet of Vehicles (IoV). and roadside units (RSUs) can exchange perceptual information driving experience to enable intelligent transportation applications such as autonomous road condition analysis. However, ensuring secure efficient among vehicles is challenging. While traditional blockchain guarantee tamper-proof...
This paper proposes a two tier RBAC approach for secure and selective information sharing among virtual multi-agency response team (VMART) and allows expansion of the VMART by admitting new collaborators (government agencies or NGOs) as need arise. A coordinator Web Service for each member agency is proposed.The coordinator Web Service is responsible for authentication, information disseminatio...
Abstract Today, cloud storage services increased the popular for data in and retrieve from any location without time limitations. One of most important demands required is secured transmission un-trusted applications. Particularly, secure efficient multiparty communications Untrusted Cloud Environments (UCE) attract widespread attentions. The equipment used UCE have particularity being heteroge...
Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need of protecting their information. Nowadays, financia...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید