Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

Hierarchical adaptive evolution framework for privacy-preserving data publishing

M You, YF Ge, K Wang, H Wang, J Cao… - World Wide Web, 2024 - Springer
The growing need for data publication and the escalating concerns regarding data privacy
have led to a surge in interest in Privacy-Preserving Data Publishing (PPDP) across …

Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments

W Wu, U Parampalli, J Liu, M Xian - World Wide Web, 2019 - Springer
To utilize the cost-saving advantages of the cloud computing paradigm, individuals and
enterprises increasingly resort to outsource their databases and data operations to cloud …

YaPPL-a lightweight privacy preference language for legally sufficient and automated consent provision in IoT scenarios

MR Ulbricht, F Pallas - International Workshop on Data Privacy …, 2018 - Springer
In this paper, we present YaPPL—a Privacy Preference Language explicitly designed to
fulfill consent-related requirements of the GDPR as well as to address technical givens of IoT …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

Decentralized voting: a self-tallying voting system using a smart contract on the ethereum blockchain

X Yang, X Yi, S Nepal, F Han - … Dubai, United Arab Emirates, November 12 …, 2018 - Springer
Electronic online voting has been piloted in various countries in the recent past. These
experiments show that further research is required, to improve the security guarantees of …

Data privacy and system security for banking and financial services industry based on cloud computing infrastructure

A Mahalle, J Yong, X Tao, J Shen - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
Cloud computing architecture and infrastructure has received an acceptance from
corporations and governments across the globe. Cloud computing helped to reduce cost of …

[图书][B] Attribute-based access control models and implementation in cloud infrastructure as a service

X Jin - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …

Privacy-preserving data publishing: an information-driven distributed genetic algorithm

YF Ge, H Wang, J Cao, Y Zhang, X Jiang - World Wide Web, 2024 - Springer
The privacy-preserving data publishing (PPDP) problem has gained substantial attention
from research communities, industries, and governments due to the increasing requirements …