Showing 1 - 10 of 155
privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved …. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems … superiority of our approach over earlier ones dealing with both the ratio of privacy and that of performance. …
Persistent link: https://www.econbiz.de/10012042666
healthcare organisations. But hosting healthcare solutions on cloud is challenging in terms of security and privacy of health … data. To address these challenges and to provide security and privacy to health data on the cloud, the authors present a … Software-as-a-Service (SaaS) application with a data model with built-in security and privacy. This data model enhances …
Persistent link: https://www.econbiz.de/10012043357
The paper discusses the use of RFID technologies in healthcare setting examining the status of applications and prospective views. The authors have identified two classes of applications of RFID technologies in healthcare setting: people monitoring/management and items/assets management...
Persistent link: https://www.econbiz.de/10012043547
Worthwhileness of Searching, Privacy, Information Trust, and Security before adopting web-based PHR. By using HINTS (Health … patients to adopt web-based PHR. Privacy, Information Trust, and Security are also enablers to adopt web-based PHR. But … privacy and security. …
Persistent link: https://www.econbiz.de/10012044253
Cloud computing, at its most fundamental level, is a technology that allows computing to occur as an on-demand utility. Personalized medicine is revolutionizing the field of medicine, and aims to provide individualized treatment for patients, based on their genetic material and medical history,...
Persistent link: https://www.econbiz.de/10012044433
This article is concerned with the arising problems and implications of physical security and privacy of personal and … computer devices, isolate smartphones as a most common device, and study types of user behavior regarding the involved security …
Persistent link: https://www.econbiz.de/10012044706
recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and … security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions …
Persistent link: https://www.econbiz.de/10012045236
This article describes how the Internet of Things (IoT) enables interaction and integration of real world things or objects—such as cars, electronic devices, homes, etc.—using various inter-operable communication protocols. This leads to a digital society of billions of devices that can...
Persistent link: https://www.econbiz.de/10012045243
bandwidth throttling, preferential treatments, and privacy. Some described the action of the FCC will lead to the end of the … Internet and consumer privacy. There have been many articles discussing about the fallout of the ruling, but it is difficult … and against, and the roles of the FCC and their many orders. They also layout the implication of repeal on security and …
Persistent link: https://www.econbiz.de/10012045250
resilience. The authors propose a set of metrics for assessing the security and privacy of information sharing tools for … security and privacy for different important categories of users of such systems, to better understand how these aspects affect … the willingness to share information. Security and privacy is of particular importance for whistle-blowers that may carry …
Persistent link: https://www.econbiz.de/10012045610