Managing and accessing data in the cloud: Privacy risks and approaches

SDC di Vimercati, S Foresti… - … and Security of Internet …, 2012 - ieeexplore.ieee.org
… or exchanging information with other parties, and to maintain control over their own
private data. In addition to this, solutions for efficiently accessing data while preserving their …

Data governance—Protecting and managing the value of your customer data assets: Stage 3: Identifying and controlling the risk in using third-party processors

A Gregory, L Bentall - Journal of Direct, Data and Digital Marketing …, 2012 - Springer
… Identifying all the third parties who have access or potential access to your … the activities
of over 850 third parties around the world — an extended network ranging from bank statement …

Securing building management systems using named data networking

W Shang, Q Ding, A Marianantoni, J Burke… - … Network, 2014 - ieeexplore.ieee.org
… Our work focuses on how to securely publish sensor data to be used by BMS … for access
control. One major contribution of this article is a novel access control solution that takes a data-…

Managing copyright in open networks

A Piva, F Bartolini, M Barni - IEEE Internet Computing, 2002 - ieeexplore.ieee.org
… services such as remote database access, archival browsing, and electronic com… the network,
where Peter accesses and buys it. For simplicity, we assume the CS is a trusted third party

Managing shared access to a spectrum commons

W Lehr, J Crowcroft - … Frontiers in Dynamic Spectrum Access …, 2005 - ieeexplore.ieee.org
… unlicensed spectrum is to rely on a technical protocol to allocate and manage shared
access. Network engineers have designed an array of protocols that enable shared access in …

[HTML][HTML] An alternative to data ownership: Managing access to non-personal data through the commons

T Fia - Global Jurist, 2021 - degruyter.com
data management in large-scale processing environments which can bolster access in view
of the shortcomings of the existing data … can freely restrict access of third parties as they wish…

Consentio: Managing consent to data access using permissioned blockchains

RR Agarwal, D Kumar, L Golab… - 2020 ieee international …, 2020 - ieeexplore.ieee.org
… Every day 3.7 billion individuals access the Internet, generating 2.5 quintillion bytes of … a
third party has been given access to their data, and, if possible, should control access to the data

On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration

T Taleb, K Samdanis, B Mada, H Flinck… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
… It also enables device management and network management such as control and … an
insight of RAN and network conditions to third parties to facilitate service enhancements. MEC can …

Smart Contracts for Managing the Agricultural Supply Chain: A Practical Case Study

E Daraghmi, S Jayousi, Y Daraghmi, R Daraghmi… - … Access, 2024 - ieeexplore.ieee.org
network is illustrated in this research. This research demonstrates that Blockchain networks
offer a solution to manage the … during transmission without being accessed by third parties. …

Medrec: Using blockchain for medical data access and permission management

A Azaria, A Ekblaw, T Vieira… - … on open and big data  …, 2016 - ieeexplore.ieee.org
… to sustain the MedRec network and bring open, big data to medical … ’s data to which the
third party viewer is allowed access. Our prototype demonstrates this design with SQL data