-
121
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
Get full text
Article -
122
Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems
Published 2025-01-01“…They are now considered essential tools for defining and controlling boundaries across various applications, from aviation safety in drone management to access control within mixed reality platforms like the metaverse. …”
Get full text
Article -
123
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
Published 2025-01-01“…To secure the exchange of threat intelligence information, a safe blockchain network is used, which comprises Byzantine Fault Tolerance for high data integrity and Zero-Knowledge Proofs for access control. All relevant information is cleaned and standardized prior to analysis. …”
Get full text
Article -
124
Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions
Published 2024-01-01“…Meanwhile, the less frequently discussed topics include access control and management in blockchain-based IoT systems and energy efficiency in wireless sensor networks using blockchain and IoT. …”
Get full text
Article -
125
ЗАХИСТ ДАНИХ В ІНФОРМАЦІЙНІЙ МОДЕЛІ МОДУЛЯ «КАФЕДРА» АВТОМАТИЗОВАНОЇ ІНФОРМАЦІЙНОЇ СИСТЕМИ УНІВЕРСИТЕТУ...
Published 2024-02-01“…Зазначено, що захист даних слід враховувати через ролі на базі RBAC (Role Base Access Control), політика якого є більш гнучкою. Крім цього, модуль «Кафедра» може бути реалізований як вебзастосунок «Блок оперативного управління», який не лише приверне увагу користувачів, але й допоможе їм швидко і легко знаходити потрібну інформацію, виконувати потрібні дії. …”
Get full text
Article -
126
Contributions to the Virtualization of the BNG
Published 2025-01-01“…It serves as a crucial component, being responsible for various essential services that allow subscribers’ connections and help optimizing infrastructure resources, including enforcing QoS policies and implementing Access Control Lists to safeguard against unauthorized access. …”
Get full text
Article -
127
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…Cyberattack recognition and mitigation techniques in CPSs include using numerous models like intrusion detection systems (IDSs), access control mechanisms, encryption, and firewalls. …”
Get full text
Article -
128
Personal Identification Using Embedded Raspberry Pi-Based Face Recognition Systems
Published 2025-01-01“…Potential applications include access control, surveillance, and statistical data collection, highlighting the system’s versatility and relevance.…”
Get full text
Article -
129
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…The proposed framework enhances security by combining BC’s immutable transaction logs for data integrity and traceability with SDN’s dynamic network reconfiguration for real-time access control and anomaly detection. The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
Get full text
Article -
130
ALTRIRAS: A Computer Game for Training Children with Autism Spectrum Disorder in the Recognition of Basic Emotions
Published 2019-01-01“…It has recreational settings built with 2D graphic interface to keep the children’s attention and an access control and a register mechanism to allow the monitoring of the child’s progress. …”
Get full text
Article -
131
A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems
Published 2023-12-01“…The findings reveal the following: (1) The SFS-FWZIC method effectively assigned weights to privacy and security properties, with access control achieving the highest significance weight (0.1934) and Secure-search receiving the lowest weight (0.0603). (2) The Grey-TOPSIS method efficiently ranked E-health systems across the three categories based on various parameters, including α=0.1,α=0.3,α=0.5,α=0.7, and α=0.9. …”
Get full text
Article -
132
Analisis Faktor yang Berpengaruh pada Adopsi E-Commerce dan Dampaknya Bagi Kinerja UKM di Kabupaten Subang
Published 2022-02-01“…This research arrives at a suggestion that SMEs who have used e-commerce should be followed by an understanding of access control and security of e-commerce itself, not only can use it. …”
Get full text
Article -
133
AN INTEGRATED INFORMATION SYSTEM ON BIORESOURCE COLLECTIONS OF THE FASO OF RUSSIA
Published 2018-05-01“…The information system “Bioresource Collections of Scientific Organizations” (IS BRC) has been developed as a Webportal (www.biores.cytogen.ru) integrating databases on bioresource collections of the FASO of Russia and graphical user interface. Access control to the databases integrated into the IS BRC is performed through authorized program access for viewing records, their creation and editing on the basis of REST technology. …”
Get full text
Article -
134
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01“…Content analysis further identified six key research areas within this domain: identity authentication and data verification, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. …”
Get full text
Article -
135
A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
Published 2018-07-01“…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for hosts and networks. …”
Get full text
Article -
136
Electronic Records Management and Office Organization: A Case Study of Rugarama Hospital.
Published 2024“…Registry staff on the importance of maintaining accessible records and provide ongoing support to address any challenges they may encounter and there is a need for implementation of access controls and permissions within digital records management systems to restrict access to sensitive information while ensuring that authorized personnel have the necessary permissions to access relevant records and there should be regularly review and update access controls to align with changing roles and responsibilities.…”
Get full text
Thesis -
137
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
Get full text
Article -
138
Design and implementation of an intelligent sports management system (ISMS) using wireless sensor networks
Published 2025-01-01“…Finally, the security layer ensures data integrity and confidentiality with robust encryption and access controls. To evaluate the system performance in different scenarios, we performed many experiments, which show that the proposed ISMS model shows the system efficacy in improving accuracy (0.94), specificity (0.97), recall (0.91), precision (0.93), F1 score (0.95), mean absolute error (MAE) (0.6), mean square error (MSE) (0.8), and root mean square error (RMSE) (0.9), compared to traditional methods. …”
Get full text
Article