نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2016
Haoyi Shi Chao Jiang Wenrui Dai Xiaoqian Jiang Yuzhe Tang Lucila Ohno-Machado Shuang Wang

BACKGROUND In biomedical research, data sharing and information exchange are very important for improving quality of care, accelerating discovery, and promoting the meaningful secondary use of clinical data. A big concern in biomedical data sharing is the protection of patient privacy because inappropriate information leakage can put patient privacy at risk. METHODS In this study, we deployed...

Journal: :CoRR 2016
Nils Ulltveit-Moe Henrik Nergaard László Erdödi Terje Gjøsæter Erland Kolstad Pål Berg

This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...

2015
Neha Thakur Supreet Kaur

This paper presents the various secure data sharing techniques in public clouds. A public cloud allows resources such as applications and storage to be accessible to the public over the internet. Due to the benefits of cloud storage, there has been a growing trend to use the public cloud for secure data sharing and storage. The public cloud storage model should solve the critical issue of data ...

1995
Rosario Gennaro Silvio Micali

We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Electronics 2023

Information sharing in vehicular networks has great potential for the future Internet of Vehicles (IoV). and roadside units (RSUs) can exchange perceptual information driving experience to enable intelligent transportation applications such as autonomous road condition analysis. However, ensuring secure efficient among vehicles is challenging. While traditional blockchain guarantee tamper-proof...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Nabil R. Adam Ahmet Kozanoglu Aabhas V. Paliwal Basit Shafiq

This paper proposes a two tier RBAC approach for secure and selective information sharing among virtual multi-agency response team (VMART) and allows expansion of the VMART by admitting new collaborators (government agencies or NGOs) as need arise. A coordinator Web Service for each member agency is proposed.The coordinator Web Service is responsible for authentication, information disseminatio...

Journal: :Journal of Cloud Computing 2022

Abstract Today, cloud storage services increased the popular for data in and retrieve from any location without time limitations. One of most important demands required is secured transmission un-trusted applications. Particularly, secure efficient multiparty communications Untrusted Cloud Environments (UCE) attract widespread attentions. The equipment used UCE have particularity being heteroge...

2014
Chalama Reddy R. Seshadri Chang-Tsun Li Violetta Cavalli-Sforza Jaime G. Carbonell Peter J. Jansen Md. Headayetullah G. K. Pradhan Muntaha Alawneh Imad M. Abbadi Achille Fokoue Mudhakar Srivatsa Pankaj Rohatgi Peter Wrobel John Yesberg

Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need of protecting their information. Nowadays, financia...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید