Performance and divisional trust and purpose-based access control for privacy preservation
Privacy has been recognized to be a critical requirement in computing environments. To keep the privacy safe from inappropriate use, one of the most popular methods that can be used is the access control. Currently, many augmentation of access control models has been developed to improve the effecti...
| Main Authors: | Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Medwell Publications
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/75261/ http://psasir.upm.edu.my/id/eprint/75261/1/Performance%20and%20divisional%20trust%20and%20purpose-based%20access%20control%20for%20privacy%20preservation.pdf |
Similar Items
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Privacy threat analysis of mobile social network data publishing
by: Abawajy, Jemal H., et al.
Published: (2018)
by: Abawajy, Jemal H., et al.
Published: (2018)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Privacy preserving for electronic health record systems
by: Yussuf, Zakariye Mohamed
Published: (2019)
by: Yussuf, Zakariye Mohamed
Published: (2019)
Non charitable purpose trusts
by: Hamzah, Hamimah
Published: (2011)
by: Hamzah, Hamimah
Published: (2011)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
The Long-term Performance of PE-backed Buyouts in the UK: Divisional Buyouts and PE Syndication
by: Cheng, Libin
Published: (2012)
by: Cheng, Libin
Published: (2012)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Estimating parameters for probabilistic linkage of privacy-preserved datasets.
by: Brown, A., et al.
Published: (2017)
by: Brown, A., et al.
Published: (2017)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Blockchain technology in the healthcare industry: trends and opportunities
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
A Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
by: Vidanage, Anushka, et al.
Published: (2020)
by: Vidanage, Anushka, et al.
Published: (2020)
A comparison of self-and superior-appraisals of divisional level managers' performance in selected Australian Companies
by: Teoh, Hai Yap
Published: (1995)
by: Teoh, Hai Yap
Published: (1995)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
Privacy preserving linkage using multiple dynamic match keys
by: Randall, Sean, et al.
Published: (2019)
by: Randall, Sean, et al.
Published: (2019)
Application of privacy-preserving techniques in operational record linkage centres
by: Boyd, James, et al.
Published: (2015)
by: Boyd, James, et al.
Published: (2015)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015)
by: Jin, Zhe
Published: (2015)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
by: Abdul Aziz, Maslina, et al.
Published: (2019)
by: Abdul Aziz, Maslina, et al.
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Analysis of access control model for data security and privacy on multi-tenant SaaS
by: Duraisamy, Gunavathi, et al.
Published: (2018)
by: Duraisamy, Gunavathi, et al.
Published: (2018)
Privacy and trust in the Islamic perspective: implication of the digital age
by: Lubis, Muharman, et al.
Published: (2013)
by: Lubis, Muharman, et al.
Published: (2013)
Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage
by: Schnell, Rainer, et al.
Published: (2017)
by: Schnell, Rainer, et al.
Published: (2017)
Similar Items
-
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019) -
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019) -
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016) -
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022) -
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)