[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

Access control models

M Penelova - Cybernetics and Information Technologies, 2021 - sciendo.com
Access control is a part of the security of information technologies. Access control regulates
the access requests to system resources. The access control logic is formalized in models …

Testing and Substantiation of Zero Trust Devices with Blockchain Procedures for Secured Data Transfer Approach

S Selvarajan, S Manickam… - Human-centric …, 2024 - eprints.leedsbeckett.ac.uk
The need for secured data transmission devices is growing in current generation networking
meadows. It is very important to process all the transmitted data in a confidential way and …

[HTML][HTML] Риск-ориентированная атрибутивная модель управления доступом для организаций высшего образования

ШГ Магомедов, АВ Козачок… - Правовая …, 2023 - cyberleninka.ru
Цель статьи: разработка риск-ориентированной модели управления доступом,
изменяющей правила доступа в зависимости от текущего уровня риска реализации …

Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection

Z Yunxiang, W Bin - Wireless Communications and Mobile …, 2023 - Wiley Online Library
The group intelligence perception privacy protection model is a method to achieve the
balance between user privacy and service requests through the cooperation between users …

A Novel Privacy-Enhanced Fine-Grained Access Control Scheme

J Liu, Y Hu, X Guo - … 8th International Conference on Signal and …, 2023 - ieeexplore.ieee.org
Access control technology ensures that information resources are not illegally used and
accessed by restricting the ability and scope of users access to object resources. While …

Proposta de um framework de compliance à Lei Geral de Proteção a Dados Pessoais (LGPD): um estudo de caso para prevenção a fraude no contexto de Big Data

AP Carvalho - 2021 - rlbea.unb.br
No cenário de produção de dados em massa ainda em expansão a níveis outrora
inimagináveis a proteção à privacidade de dados é um problema que vem ganhando mais …

Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection

Y Zhang, B Wang - Wireless Communications & Mobile …, 2023 - search.proquest.com
The group intelligence perception privacy protection model is a method to achieve the
balance between user privacy and service requests through the cooperation between users …

[HTML][HTML] ArticlesTesting and Substantiation of Zero Trust Devices with Blockchain Procedures for Secured Data Transfer Approach

S Selvarajan, S Manickam, H Manoharan, SUA Laghari… - hcisj.com
The need for secured data transmission devices is growing in current generation networking
meadows. It is very important to process all the transmitted data in a confidential way and …