Current approaches of enforcing FGAC in Database Management Systems (DBMS) do not scale in scenarios when the number of policies are in the order of thousands. This paper …
H Xie, Y Guo, X Jia - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Fog computing has emerged as a promising framework with the rapid growth of the Internet of Things (IoT). In fog computing, the new entity, named fog device, can help the cloud …
H Hao, J Zhang, Q Gu - Mobile Networks and Applications, 2022 - Springer
To solve the problem of limited computing ability in mobile devices, edge computing is adopted as a feasible solution which provides services for IoT devices in different …
Y Cui, F Gao, W Li, Y Shi, H Zhang, Q Wen… - Sensors, 2020 - mdpi.com
Location-Based Services (LBSs) are playing an increasingly important role in people's daily activities nowadays. While enjoying the convenience provided by LBSs, users may lose …
H Zhang, P Li - Journal of Cyber Security and Mobility, 2023 - journals.riverpublishers.com
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the …
J Sun, S Sun, K Li, D Liao, AK Sangaiah… - Computers & Electrical …, 2018 - Elsevier
We propose a scheme for Cloud-of-Things and Edge Computing (CoTEC) traffic management in multi-domain networks. To direct the traffic flow through the service nodes …
N Mukherjee, G Paul, SK Saha - Multimedia Tools and Applications, 2018 - Springer
Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms …
The next generation of IoT scenarios must consider security aspects as a first class component. As a core aspect, key management is crucial for the establishment of security …
In the context of Internet of Things (IoT), the cooperation and synergy between varied and disparate communicating objects is strained by trustworthiness, confidentiality and …