Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Marco Casassa-Mont"'
Autor:
Sabri Barbaria, Marco Casassa Mont, Essam Ghadafi, Halima Mahjoubi Machraoui, Hanene Boussi Rahmouni
Publikováno v:
IEEE Access, Vol 10, Pp 106334-106351 (2022)
Nowadays, due to the evolution of information technologies and their adoption in the healthcare domain, new risks to medical data protection and patient privacy are increasingly present. It is therefore important to implement approaches that can prev
Externí odkaz:
https://doaj.org/article/1747ab3ffc5240a4a744cd2a6b9e123a
Publikováno v:
International journal of information security (Internet) 14 (2015): 319–334. doi:10.1007/s10207-014-0258-5
info:cnr-pdr/source/autori:Casassa-Mont M.; Matteucci I.; Petrocchi M.; Sbodio M.L./titolo:Towards safer information sharing in the cloud/doi:10.1007%2Fs10207-014-0258-5/rivista:International journal of information security (Internet)/anno:2015/pagina_da:319/pagina_a:334/intervallo_pagine:319–334/volume:14
info:cnr-pdr/source/autori:Casassa-Mont M.; Matteucci I.; Petrocchi M.; Sbodio M.L./titolo:Towards safer information sharing in the cloud/doi:10.1007%2Fs10207-014-0258-5/rivista:International journal of information security (Internet)/anno:2015/pagina_da:319/pagina_a:334/intervallo_pagine:319–334/volume:14
Web interactions usually require the exchange of personal and confidential information for a variety of purposes, including enabling business transactions and the provisioning of services. A key issue affecting these interactions is the lack of trust
Publikováno v:
Computer Standards & Interfaces. 36:689-703
We describe a data management solution and associated key management approaches to provide accountability within service provision networks, in particular addressing privacy issues in cloud computing applications. Our solution involves machine readab
Autor:
Dimitris Papadopoulos, Eleni Trouva, Antonis Litke, Ludovic Emmanuel Paul Noel Jacquin, Marco Casassa-Mont, Cristian Dávila, Eleni-Constantina Davri, Hamza Attak, Bernat Gastón, Nikolaos Papadakis, Carolina Fernandez, Georgios Gardikis, Antonio Lioy, Jerónimo Núñez
Publikováno v:
Computer Communications and Networks ISBN: 9783319646527
Guide to Security in SDN and NFV
Guide to Security in SDN and NFV
Organisations are witnessing an unprecedented escalation of cyber-crime attacks and struggle to protect against them. Rethinking security is required to cope with numerous new challenges arising today: the sophistication of new attacks, the increasin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce1075bc578bde87b4a293eccd77271c
https://doi.org/10.1007/978-3-319-64653-4_8
https://doi.org/10.1007/978-3-319-64653-4_8
Autor:
Marco Casassa Mont, Siani Pearson
Publikováno v:
Computer. 44:60-68
Machine-readable policies can stick to data to define allowed usage and obligations as it travels across multiple parties, enabling users to improve control over their personal information. The EnCoRe project has developed such a technical solution f
Publikováno v:
Computer. 44:66-73
An analytic methodology involving modeling and simulation could help decision makers determine how their employees' use of social networks impacts their organization, identify how to mitigate potential risks, and evaluate the financial and organizati
Publikováno v:
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 368:4057-4072
The sharing of medical data between different healthcare organizations in Europe must comply with the legislation of the Member State where the data were originally collected. These legal requirements may differ from one state to another. Privacy req
Publikováno v:
Journal of Computer Security. 18:541-572
Federated identity management is an emerging paradigm that is rightly getting a lot of standardization and research attention. One aspect that is not receiving enough attention is assurance. Given the challenges enterprises faced trying to demonstrat
Publikováno v:
IEEE Security & Privacy. 6:34-42
The problem of migrating sensitive information between systems in dynamic environments is increasingly important as distributed computing expands. A proposed policy-based approach provides controlled and secure transfer of user credentials and data a