The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Healthcare organizations are interested in adopting collaborative systems to improve the quality of medical services. Recently, cloud computing has fueled the integration of modern information and communication technologies in the healthcare system. In fact, this new paradigm provides computational resources to the end users as services. Furthermore, it is used to share medical information across...
Cloud computing benefits from widespread adoption in every sector of our society and economy, due, at least in part, to the promise of cost-effective and elastic provisioning of computing resources. Manufacturing is one domain where cloud computing is starting to be seen as a promising solution to strengthen collaboration and cooperation capabilities, fostered by novel organization models and strategies...
Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security...
Existing cloud storage systems lack privacy aware architectures that meet accessibility goals for complex collaboration. This deficiency is fully realized in the healthcare industry, where cloud-enabling technology blurs the ownership boundary of health and wellness information. Whether among traditional ‘stovepiped’ data silos, health information exchanges or personally controlled health information...
Cloud storage services are not secure by nature. There is an inherent risk of (a) data exposure (confidentiality), (b) data tampering (integrity) and (c) denial of access to data (availability). We provide a service-oriented solution for provisioning secure storage service in the hybrid cloud environment, called Trust Store. The system is suitable to facilitate individual as well as collaborative...
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper we present a privacy-preserving transformation that allows secure outsourcing of the linear program computation in an efficient manner...
The re-perimeterization and the erosion of trust boundaries already happening in organizations is amplified and accelerated by Cloud Computing. Cloud service models employed, operational models, and technologies used to enable Cloud services may present additional risks and requirements to an organization compared to traditional IT solutions. This paper focuses on Cloud security management issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.