As digital healthcare evolves, the security of electronic health records (EHR) becomes increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating …
For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …
H Wang, J Cao, Y Zhang - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This work proposes a practical payment protocol with scalable anonymity for Internet purchases, and analyzes its role-based access control (RBAC). The protocol uses electronic …
In the cyber world, insider threats significantly challenge organizational security. These threats originate from malicious or negligent employees with authorized access, making …
Insider threats refer to abnormal actions taken by individuals with privileged access, compromising system data's confidentiality, integrity, and availability. They pose significant …
H Wang, Y Zhang, J Cao - IEEE Transactions on Knowledge …, 2008 - ieeexplore.ieee.org
A global education system, as a key area in future IT, has fostered developers to provide various learning systems with low cost. While a variety of e-learning advantages has been …
To fully exploit enormous data generated by intelligent devices in edge computing, edge federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …
The privacy-preserving data publishing (PPDP) problem has gained substantial attention from research communities, industries, and governments due to the increasing requirements …
This book introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of Things and …