Mastering data privacy: leveraging K-anonymity for robust health data sharingSpringer Science and Business Media LLC - - 2024
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm ...... hiện toàn bộ
CADS-ML/DL: efficient cloud-based multi-attack detection systemSpringer Science and Business Media LLC - - 2023
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every organization. Traditional security approaches such as signature-based and rule-based have limited detection capabilities toward new and sophisticated attacks. To address this issue, there has been an increasing focus on implementing Artificial Intelligence (...... hiện toàn bộ
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologiesSpringer Science and Business Media LLC -
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroki Suzuki, Takashi Obi
AbstractWith the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to atta...... hiện toàn bộ
A method for identifying Web applicationsSpringer Science and Business Media LLC - Tập 8 - Trang 455-467 - 2009
Mario Kozina, Marin Golub, Stjepan Groš
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and mon...... hiện toàn bộ
Efficient attribute-based encryption with repeated attributes optimizationSpringer Science and Business Media LLC - Tập 20 - Trang 431-444 - 2020
Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the...... hiện toàn bộ
A multiresolution approach for optimal defense against random attacksSpringer Science and Business Media LLC - Tập 14 - Trang 61-72 - 2014
Michael Valenzuela, Ferenc Szidarovszky, Jerzy Rozenblit
Whether it be one security expert covering more systems or reducing total man-hours, there has always been a push to do more with less. Intuitively, we realize different systems need different levels of security. To aid in this effort, we develop multiresolution attacker/defender games by combining two game theoretic approaches: resource assignment and optimal response. We use the resource assignm...... hiện toàn bộ
Token-based graphical password authenticationSpringer Science and Business Media LLC - Tập 10 - Trang 321-336 - 2011
John Charles Gyorffy, Andrew F. Tappenden, James Miller
Given that phishing is an ever-increasing problem, a better authentication system is required. We propose a system that uses a graphical password deployed from a Trojan and virus-resistant embedded device. The graphical password utilizes a personal image to construct an image hash, which is provided as input into a cryptosystem that returns a password. The graphical password requires the user to s...... hiện toàn bộ
Double-trapdoor anonymous tags for traceable signaturesSpringer Science and Business Media LLC - Tập 12 - Trang 19-31 - 2013
Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo
This paper introduces a novel tool, public-key anonymous tag system, which is useful in building controlled privacy-protecting protocols. The double-trapdoor structure of the system not only allows the authority to create a token which can trace someone’s tags without violating anonymity of the tag issuer, but also allows the issuer to claim or deny the authorship of a tag in the stateless manner....... hiện toàn bộ