D Tith, JS Lee, H Suzuki… - Healthcare …, 2020 - synapse.koreamed.org
Objectives Currently, patients' consent is essential to use their medical records for various purposes; however, most people give their consent using paper forms and have no control …
As digital healthcare evolves, the security of electronic health records (EHR) becomes increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating …
Abstract The General Data Protection Regulation (GDPR) has substantially strengthened the requirements for data processing systems, requiring audits at scale. We show how and to …
B Tay, A Mourad - IEEE Access, 2020 - ieeexplore.ieee.org
In the current banking systems and business processes, the permission granted to employees is controlled and managed by the configured access control methods, in which …
In the cyber world, insider threats significantly challenge organizational security. These threats originate from malicious or negligent employees with authorized access, making …
H Wang, J Cao, Y Zhang, H Wang, J Cao… - … Control Management in …, 2020 - Springer
This chapter proposes a purpose-based access control model in distributed computing environment for privacy preserving policies and mechanisms, and describes algorithms for …
To fully exploit enormous data generated by intelligent devices in edge computing, edge federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …
QNT Thi, TK Dang, HL Van, HX Son - Security, Privacy, and Anonymity in …, 2017 - Springer
With the growth of big data systems and ubiquitous computing, privacy has become a critical issue in security research. Purpose based access control model is a common approach for …
HX Son, E Chen - … Journal of Advanced Computer Science and …, 2019 - researchgate.net
Access control is a security technique that specifies access rights to resources in a computing environment. As information systems nowadays become more complex, it plays …