Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …

Smart e-commerce systems: current status and research challenges

Z Song, Y Sun, J Wan, L Huang, J Zhu - Electronic Markets, 2019 - Springer
With the ongoing progress in cloud computing, big data analytics (BDA) and other
burgeoning technologies, the integration of intelligence and e-commerce systems now …

A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA

VB Chenam, ST Ali - Computer Standards & Interfaces, 2022 - Elsevier
With the massive growth of the World Wide Web (ie, internet), individual users or companies
can store and manage large amounts of sensitive data to outsource it to the cloud server …

Understanding users' willingness to put their personal information on the personal cloud-based storage applications: An empirical study

AE Widjaja, JV Chen, BM Sukoco, QA Ha - Computers in Human Behavior, 2019 - Elsevier
Despite prevalent privacy and security threats on the cloud, users have put tremendous
amounts of their personal information on cloud storage. This present study proposes a …

Building a security reference architecture for cloud systems

EB Fernandez, R Monge, K Hashizume - Requirements Engineering, 2016 - Springer
Reference architectures (RAs) are useful tools to understand and build complex systems,
and many cloud providers and software product vendors have developed versions of them …

Assurance of security and privacy requirements for cloud deployment models

S Islam, M Ouedraogo, C Kalloniatis… - … on Cloud Computing, 2015 - ieeexplore.ieee.org
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are
challenges specifically related to security and privacy. It is important that cloud users …

An overview of security challenges in communication networks

M Furdek, L Wosinska, R Goścień… - 2016 8th …, 2016 - ieeexplore.ieee.org
The ongoing transition towards a networked society requires reliable and secure network
infrastructure and services. As networks evolve from simple point to point systems towards …

A risk management framework for cloud migration decision support

S Islam, S Fenz, E Weippl, H Mouratidis - Journal of Risk and Financial …, 2017 - mdpi.com
Managing risks is of paramount importance for enabling a widespread adoption of cloud
computing. Users need to understand the risks associated with the process of migrating …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

privacyTracker: a privacy-by-design GDPR-compliant framework with verifiable data traceability controls

H Gjermundrød, I Dionysiou, K Costa - … , June 6-9, 2016. Revised Selected …, 2016 - Springer
Breach or lack of online privacy has become almost a commonplace of today's digital age,
mainly due to the inability of either enforcing privacy requirements or imposing strict …