Attribute-based approaches for secure data sharing in industrial contexts

A Chiquito, U Bodin, O Schelén - IEEE Access, 2023 - ieeexplore.ieee.org
The sharing of data is becoming increasingly important for the process and manufacturing
industries that are using data-driven models and advanced analysis to assess production …

Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud

T Kanwal, A Anjum, SUR Malik, A Khan… - Computer Standards & …, 2021 - Elsevier
An increasing trend in healthcare organizations to outsource EHRs' data to the cloud
highlights new challenges regarding the privacy of given individuals. Healthcare …

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes

T Kanwal, A Anjum, SUR Malik, H Sajjad, A Khan… - Computers & …, 2021 - Elsevier
Privacy preserving data publishing of electronic health record (EHRs) for 1 to M datasets
with multiple sensitive attributes (MSAs) is an interesting and challenging issue. There is …

Virtual pseudonym-changing and dynamic grouping policy for privacy preservation in vanets

I Ullah, MA Shah, A Khan, C Maple, A Waheed - Sensors, 2021 - mdpi.com
Location privacy is a critical problem in the vehicular communication networks. Vehicles
broadcast their road status information to other entities in the network through beacon …

XACBench: a XACML policy benchmark

S Ahmadi, M Nassiri, M Rezvani - Soft Computing, 2020 - Springer
XACML standard defines a declarative language to determine access control policies which
are critical for deploying security solutions. It is important to evaluate the performance of …

SPAM: An Enhanced Performance of Security and Privacy-Aware Model over Split Learning in Consumer Electronics

K Kishor, KK Agrawal, SP Yadav, HK Thakur… - … and Computer Software, 2024 - Springer
The use of consumer electronics has grown drastically in recent times due to advancements
in technology. It has resulted in users expecting privacy and security from data shared over …

A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi‐records datasets

T Kanwal, A Anjum, A Khan… - Transactions on …, 2021 - Wiley Online Library
The collection of private health data without compromising privacy is an imperative aspect of
privacy‐aware data collection mechanisms. Privacy‐preserved data collection is achieved …

An Autonomous Role and Consideration of Electronic Health Systems with Access Control in Developed Countries: A Review

MR Salji, NI Udzir - International Journal of Advanced …, 2023 - search.proquest.com
The electronic healthcare system (EHS) nowadays is essential to access, maintain, store,
and share the electronic health records (EHR) of patients. It should provide safer, more …

Modelos de control de acceso más utilizados en la seguridad de datos médicos

B Campos-Montero, C Rodríguez-Sandoval… - Revista Tecnología en …, 2024 - scielo.sa.cr
El acceso no autorizado a datos sensibles de pacientes es un problema que atenta contra
ellos mismos y la seguridad de las organizaciones dedicadas al servicio de salud, para lo …

Detection of Conflicts Between Resource Authorization Rules in Extensible Access Control Markup Language Based on Dynamic Description Logic.

S Yang, C Tan - Ingénierie des Systèmes d'Information, 2020 - search.ebscohost.com
For resources in an open environment, the access control rules (ACRs), which are described
by extensible access control markup language (XACML), might have conflicts between each …