The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security...
Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security...
Learning management systems are widely and successfully used for the delivery of self-paced online courses. This paper is concerned with enhancing the capability of such systems by introducing adaptivity in the way the information is presented to the on-line learner. Adaptivity means that the presentation style is personalised to the preferred learning style of each student, as may be modelled by...
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA, is proposed. The CoCoA...
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distribute his signing capability among a set of trusted third party hosts (TTP-hosts) via a mobile agent. The protocol incorporates three schemes: a novel Distributed Reputation Management scheme, a modified version of the Distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.