Security and privacy protection in cloud computing: Discussions and challenges

PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
… The basic ABE has only a “threshold” operation; so the flexibility is severely limited. However,
many applications need to support a flexible access control policy to realize the encryption …

5G wireless security and privacy: Architecture and flexible mechanisms

D Fang, Y Qian - IEEE vehicular technology magazine, 2020 - ieeexplore.ieee.org
security and privacy are presented, and possible solutions in terms of security architecture
and flexible security/privacy … Finally, we present a flexible security mechanism for 5G Internet …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - … Security Symposium (USENIX Security …, 2013 - usenix.org
… We show the flexibility of our architecture by policydriven instantiations of selected security
models … We show the flexibility of our architecture by policy-driven instantiations of selected …

Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
… review of the literatures on data security and privacy issues, data encryption … security and
privacy protection in cloud storage system. Thirdly, data encryption technologies and protection

[PDF][PDF] Future of Flexible Work in the Digital Age: Bring Your Own Device Challenges of Privacy Protection.

K Degirmenci, JP Shim, MH Breitner, F Nolte… - ICIS, 2019 - metadataetc.org
privacy protection, which in turn hampers companies’ BYOD strategies. We analyze how
employees’ privacy concerns substantially affect their privacy … ’ BYOD privacy concerns enables …

Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection

W Tong, L Yang, Z Li, X Jin, L Tan - Sensors, 2024 - mdpi.com
… such as identity authentication, privacy protection, and flexible combination of permissions,
security of the scheme, focusing on its privacy protection performance and potential security

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

PD Giang, LX Hung, S Lee, YK Lee… - … on Multimedia and …, 2007 - ieeexplore.ieee.org
… control mechanism for security and privacy in ubiquitous … a flexible solution capable of control
the security and privacy … helping to manage the security and privacy issues efficiently. The …

Achieving flexible and self-contained data protection in cloud computing

B Lang, J Wang, Y Liu - IEEE Access, 2017 - ieeexplore.ieee.org
… RBAC-CPABE to protect privacy and enforce access control … the ability to ensure its own
security using both encryption and a … (1) To specify a flexible access policy for each data object …

An efficient and flexible way to protect privacy in RFID environment with licenses

SC Cha, KJ Huang, HM Chang - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
… data and the content of the licenses, this paper can hopefully provide an efficient and flexible
way to overcome the deficiency of current privacy protection technologies for RFID system. …

Optimizing security and flexibility by designing a high security system for e-government servers

YY Abdul Talib, BB Zaidan, AA Zaidan, AW Naji - 2009 - repo.uum.edu.my
… multiple security challenges, thus this paper proposed a model on how to secure the servers
and how to ensure the flexibility of … Privacy is refers as a protecting personal information the …