Provenance data management in health information systems: a systematic literature review

MJ Sembay, DDJ de Macedo, LP Júnior… - Journal of Personalized …, 2023 - mdpi.com
Aims: This article aims to perform a Systematic Literature Review (SLR) to better understand
the structures of different methods, techniques, models, methodologies, and technologies …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

Internet of Things‐Based Data Hiding Scheme for Wireless Communication

A Shobanadevi, G Maragathm… - Wireless …, 2022 - Wiley Online Library
The substantial rise of information technology has facilitated the methods of access to digital
information and internet of things (IOT). Digital image processing handles the digital material …

Security-aware provenance for transparency in iot data propagation

FT Jaigirdar, B Tan, C Rudolph, C Bain - IEEE Access, 2023 - ieeexplore.ieee.org
A successful application of an Internet of Things (IoT) based network depends on the
accurate and successful delivery of data collected from numerous sources. A significant …

Malicious code classification method based on deep residual network and hybrid attention mechanism for edge security

Y Shao, Y Lu, D Wei, J Fang, F Qin… - … and Mobile Computing, 2022 - Wiley Online Library
Edge computing is a feasible solution for effectively collecting and processing data in
industrial Internet of Things (IIoT) systems, and edge security is an important guarantee for …

Improving cybersecurity situational awareness in smart grid environments

TT Dayaratne, FT Jaigirdar, R Dasgupta… - … Methods, Concepts, and …, 2023 - Springer
Demand response (DR) and peer-to-peer (P2P) energy trading in smart grids use distributed
architectures and multiple data sources to enable more consumer involvement. Given the …

Risk and compliance in IoT-health data propagation: A security-aware provenance based approach

FT Jaigirdar, C Rudolph, C Bain - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Data generated from various dynamic applications of Internet of Things (IoT) based
healthcare technology is effectively used for decision-making, providing reliable and smart …

Addressing Privacy And Ethical Considerations In Health Information Management Systems (IMS)

MA Rahman, MMI Jim - … Journal of Health …, 2024 - globalmainstreamjournal.com
This paper explores the crucial role of privacy and ethics in Health Information Management
Systems (HIMS), addressing the inherent challenges and presenting innovative solutions …

Secure Traceability Mechanism of Green Electricity Based on Smart Contracts and Provenance Model

S Yu, J Yang, J Ni, C Chen, T Yu, A Chen, J Geng… - Heliyon, 2024 - cell.com
Green and low-carbon development is an important part of global sustainable development.
Green power trading provides strong support and assurance for promoting green and low …

Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system

J Lola, C Serrão, J Casal - Electronics, 2023 - mdpi.com
In recent years, we have seen a growing wave in the integration of IoT (Internet of Things)
technologies into society. This has created new opportunities, but at the same time given …