A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

Improving accessibility of the Australian My Health Records while preserving privacy and security of the system

P Vimalachandran, H Liu, Y Lin, K Ji, H Wang… - … Information Science and …, 2020 - Springer
Abstract Australian My Health Record (MyHR) is a significant development in empowering
patients, allowing them to access their summarised health information themselves and to …

Privacy aware access control for big data: A research roadmap

P Colombo, E Ferrari - Big Data Research, 2015 - Elsevier
Big Data is an emerging phenomenon that is rapidly changing business models and work
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …

Building access control policy model for privacy preserving and testing policy conflicting problems

H Wang, J Cao, Y Zhang, H Wang, J Cao… - … Control Management in …, 2020 - Springer
This chapter proposes a purpose-based access control model in distributed computing
environment for privacy preserving policies and mechanisms, and describes algorithms for …

Enhancing MongoDB with purpose-based access control

P Colombo, E Ferrari - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Privacy has become a key requirement for data management systems. Nevertheless,
NoSQL datastores, namely highly scalable non relational database management systems …

Insider threat detection using supervised machine learning algorithms

P Manoharan, J Yin, H Wang, Y Zhang… - Telecommunication …, 2023 - Springer
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

Using JSON to specify privacy preserving-enabled attribute-based access control policies

QNT Thi, TK Dang, HL Van, HX Son - Security, Privacy, and Anonymity in …, 2017 - Springer
With the growth of big data systems and ubiquitous computing, privacy has become a critical
issue in security research. Purpose based access control model is a common approach for …

Decentralized voting: a self-tallying voting system using a smart contract on the ethereum blockchain

X Yang, X Yi, S Nepal, F Han - … Dubai, United Arab Emirates, November 12 …, 2018 - Springer
Electronic online voting has been piloted in various countries in the recent past. These
experiments show that further research is required, to improve the security guarantees of …

Realizing purpose-based privacy policies succinctly via information-flow labels

NVN Kumar, RK Shyamasundar - 2014 IEEE Fourth …, 2014 - ieeexplore.ieee.org
Privacy policies are often defined in terms of purposes for which the information may be
used. Recent work on specification and enforcement of purpose-based privacy policies …