Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures

P Asuquo, H Cruickshank, J Morley… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …

[图书][B] Data protection from insider threats

E Bertino - 2012 - books.google.com
As data represent a key asset for today's organizations, the problem of how to protect this
data from theft and misuse is at the forefront of these organizations' minds. Even though …

Proximity based content security

AA Dhondse, A Pikle, LI Rusu, G Sivakumar - US Patent 10,114,968, 2018 - Google Patents
Embodiments include method, systems and computer program products for proximity based
content security. Aspects include receiving a request to access a secured data by a user …

2TAC: Distributed access control architecture for" Bring Your Own Device" security

S Chung, S Chung, T Escrig, Y Bai… - 2012 ASE/IEEE …, 2012 - ieeexplore.ieee.org
Mobile devices, specifically smartphones, have become ubiquitous. For this reason,
businesses are starting to develop" Bring Your Own Device" policies to allow their …

Sentient-based access control model: a mitigation technique for advanced persistent threats in smartphones

Z Zulkefli, MM Singh - Journal of Information Security and Applications, 2020 - Elsevier
This research sheds light on the nature of an advanced persistent threat (APT) on
smartphones by analysing real APT attack cases targeting smartphone users. Based on the …

Vispark: GPU-accelerated distributed visual computing using spark

W Choi, S Hong, WK Jeong - SIAM Journal on Scientific Computing, 2016 - SIAM
With the growing need of big-data processing in diverse application domains, MapReduce
(eg, Hadoop) has become one of the standard computing paradigms for large-scale …

Applications of secure location sensing in healthcare

PD Martin, M Rushanan, T Tantillo… - Proceedings of the 7th …, 2016 - dl.acm.org
Secure location sensing has the potential to improve healthcare processes regarding
security, efficiency, and safety. For example, enforcing close physical proximity to a patient …

Gargoyle: A network-based insider attack resilient framework for organizations

A Shaghaghi, SS Kanhere, MA Kaafar… - 2018 IEEE 43rd …, 2018 - ieeexplore.ieee.org
Anytime, Anywhere'data access model has become a widespread IT policy in organizations
making insider attacks even more complicated to model, predict and deter. Here, we …

Bring your own device (byod) security threats and mitigation mechanisms: Systematic mapping

CI Eke, AN Anir - 2021 International Conference on Computer …, 2021 - ieeexplore.ieee.org
The aim of this study is to conduct a systematic mapping on security threats and mitigation
mechanisms for Bring Your Own Device (BYOD), to enable the new scholars planning to …

SEPD: An access control model for resource sharing in an IoT environment

HGG Pereira, PWL Fong - … ESORICS 2019: 24th European Symposium on …, 2019 - Springer
In an open Internet-of-Things (IoT) environment, the chance encounters of smart devices
have made it difficult to articulate access control policies for complete strangers. Based on …