唤醒 发表于 2025-3-27 00:26:41

Privacy-Preserving Telemonitoring for eHealthy, not only contributes to the democratization of healthcare, by reaching far-away populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the comfort of their homes. Despite all of these advantages, however, patients are still resisti

CLAP 发表于 2025-3-27 02:29:47

http://reply.papertrans.cn/27/2633/263226/263226_32.png

drusen 发表于 2025-3-27 06:35:48

http://reply.papertrans.cn/27/2633/263226/263226_33.png

myriad 发表于 2025-3-27 10:51:04

Distributed Privilege Enforcement in PACSul access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of

必死 发表于 2025-3-27 17:20:42

http://reply.papertrans.cn/27/2633/263226/263226_35.png

neologism 发表于 2025-3-27 20:06:40

http://reply.papertrans.cn/27/2633/263226/263226_36.png

defuse 发表于 2025-3-27 22:43:32

Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerssuch data sharing is subject to constraints imposed by privacy of individuals or data subjects as well as data confidentiality of institutions or data providers. Concretely, given a query spanning multiple databases, query results should not contain individually identifiable information. In addition

figurine 发表于 2025-3-28 06:05:09

Detecting Inference Channels in Private Multimedia Data , Social Networkses to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addr

高度 发表于 2025-3-28 07:08:56

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clientsing layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients..In this paper, we address this issue and propose a novel mod

戏法 发表于 2025-3-28 13:44:36

Data Is Key: Introducing the Data-Based Access Control Paradigmwe suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given . pieces of data, an agent is able to recover all . items once she knows . of
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Data and Applications Security XXIII; 23rd Annual IFIP WG Ehud Gudes,Jaideep Vaidya Conference proceedings 2009 IFIP International Federat