Distributed ledger technology for eHealth identity privacy: State of the art and future perspective

MA Bouras, Q Lu, F Zhang, Y Wan, T Zhang, H Ning - Sensors, 2020 - mdpi.com
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth
system. Distributed ledger technology (DLT) is an emerging technology that can achieve …

An overview of the common elements of learning management system policies in higher education institutions

D Turnbull, R Chugh, J Luck - TechTrends, 2022 - Springer
Learning management systems form an integral part of the learning environments of most
universities and support a wide range of diverse activities and operations. However …

[HTML][HTML] A capability-based security approach to manage access control in the internet of things

S Gusmeroli, S Piccione, D Rotondi - Mathematical and Computer …, 2013 - Elsevier
Resource and information protection plays a relevant role in distributed systems like the
ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Collaborative and secure sharing of healthcare data in multi-clouds

B Fabian, T Ermakova, P Junghanns - Information Systems, 2015 - Elsevier
In healthcare, inter-organizational sharing and collaborative use of big data become
increasingly important. The cloud-computing paradigm is expected to provide an …

Proposed security model and threat taxonomy for the Internet of Things (IoT)

S Babar, P Mahalle, A Stango, N Prasad… - Recent Trends in …, 2010 - Springer
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to
security and privacy in end to end communication of things. Protection of data and privacy of …

Programming pervasive and mobile computing applications with the TOTA middleware

M Mamei, F Zambonelli - Second IEEE Annual Conference on …, 2004 - ieeexplore.ieee.org
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …

A survey on identity and access management for cross-domain dynamic users: issues, solutions, and challenges

A Badirova, S Dabbaghi, FF Moghaddam… - IEEE …, 2023 - ieeexplore.ieee.org
Access control management in a heterogeneous cloud environment, where the number of
users is growing, is a daunting task for service providers. Efficiency is heavily reliant on …

Governance and societal impact of blockchain-based self-sovereign identities

R Benchaya Gans, J Ubacht, M Janssen - Policy and Society, 2022 - academic.oup.com
Traditionally, governments and companies store data to identify persons for services
provision and interactions. The rise of self-sovereign identities (SSIs) based on blockchain …

Federated identity architecture of the European eID system

J Carretero, G Izquierdo-Moreno… - IEEE …, 2018 - ieeexplore.ieee.org
Federated identity management is a method that facilitates management of identity
processes and policies among the collaborating entities without a centralized control …