Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

Secure network cloud architecture

BT Spiers, M Halas, RA Schimmel… - US Patent …, 2015 - Google Patents
Apparatuses, computer readable media, methods, and systems are described for requesting
creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud …

Securing the e-health cloud

H Löhr, AR Sadeghi, M Winandy - … of the 1st acm international health …, 2010 - dl.acm.org
Modern information technology is increasingly used in healthcare with the goal to improve
and enhance medical services and to reduce costs. In this context, the outsourcing of …

Secure network cloud architecture

BT Spiers, M Halas, RA Schimmel… - US Patent …, 2014 - Google Patents
Apparatuses, computer readable media, methods, and sys tems are described for
requesting creation of virtual machine (VM) in a cloud environment comprising a virtual …

PolicyCop: An autonomic QoS policy enforcement framework for software defined networks

MF Bari, SR Chowdhury, R Ahmed… - 2013 IEEE SDN for …, 2013 - ieeexplore.ieee.org
Network management is becoming increasingly challenging with the relentless growth in
network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept …

Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency

AR Sadeghi, T Schneider, M Winandy - … 2010, Berlin, Germany, June 21-23 …, 2010 - Springer
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming
more and more important. Pure cryptographic solutions based on fully homomorphic and …

Mobile trusted computing

N Asokan, JE Ekberg, K Kostiainen… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Trusted computing technologies for mobile devices have been researched, developed, and
deployed over the past decade. Although their use has been limited so far, ongoing …

[PDF][PDF] MEC-IoT-Healthcare: Analysis and Prospects.

H Wang, M Dauwed, I Khan, NS Sani… - … Materials & Continua, 2023 - cdn.techscience.cn
Physical sensors, intelligent sensors, and output recommendations are all examples of
smart health technology that can be used to monitor patients' health and change their …

Trusted Virtual Domains–design, implementation and lessons learned

L Catuogno, A Dmitrienko, K Eriksson… - Trusted Systems: First …, 2010 - Springer
Abstract A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (eg,
network, storage) that are distributed over multiple physical platforms and share a common …

Enterprise information risk management: Dealing with cloud computing

A Baldwin, D Pym, S Shiu - Privacy and security for cloud computing, 2013 - Springer
Managing information risk is a complex task that must continually adapt to business and
technology changes. We argue that cloud computing presents a more significant step …