Access control model based on trust, purpose, and role in materialized view for privacy protection
Data privacy is one of the fundamental needs of the people. In a computing environment, there are various issues of data privacy protection in the enterprise. To enforce automation of privacy and legal policies, access control has become a common subject that are always been applied. Despite the...
| Main Author: | Salji, Mohd Rafiz |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/84593/ http://psasir.upm.edu.my/id/eprint/84593/1/FSKTM%202019%2047%20IR.pdf |
Similar Items
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
by: Mohd Ali, Fazlina
Published: (2022)
by: Mohd Ali, Fazlina
Published: (2022)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Unstructured big data processing in cloud computing environment by using Amazon Elastic Map Reduce
by: Busu, Norzaharawani
Published: (2017)
by: Busu, Norzaharawani
Published: (2017)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Robust communication in differential relay protection using wireless technique
by: Badar, Malik Qasim
Published: (2015)
by: Badar, Malik Qasim
Published: (2015)
Playing the legal card: using ideation cards to raise data protection issues within the design process
by: Luger, Ewa, et al.
Published: (2015)
by: Luger, Ewa, et al.
Published: (2015)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Organizational level continuance model of cloud computing for higher education institutions
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
by: Mohammed, Qasem Yousef Abdulelah
Published: (2021)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
Privacy concern on social network sites: the role of protection motivation, trust and risk
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
A platform for controlling robotic manipulators using cloud computing power
by: Moghrabiah, Mohammed Yasser
Published: (2019)
by: Moghrabiah, Mohammed Yasser
Published: (2019)
Enhancing obfuscation technique for protecting source code against software reverse engineering
by: Mahfoudh, Asma
Published: (2019)
by: Mahfoudh, Asma
Published: (2019)
Prototype Security Door Access System
by: Saharedan, Mohd Shahril
Published: (2005)
by: Saharedan, Mohd Shahril
Published: (2005)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Spatial resolution enhancement using deep learning and data augmentation for cloud-based infrastructure
by: Mohamed, Moataz Ahmed Abdelghaffar
Published: (2019)
by: Mohamed, Moataz Ahmed Abdelghaffar
Published: (2019)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Enhance Cloudlet Scheduling Policy (ECSP) using cloudsim toolkit with resubmission fault tolerance mechanism
by: Auzir, Juliza
Published: (2018)
by: Auzir, Juliza
Published: (2018)
Scheduling tight deadlines for scientific workflows in the cloud
by: Bajaher, Awadh Salem Saleh
Published: (2018)
by: Bajaher, Awadh Salem Saleh
Published: (2018)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
Teaching data science and cloud computing in low and middle income countries
by: Shanahan, Hugh, et al.
Published: (2015)
by: Shanahan, Hugh, et al.
Published: (2015)
Energy and performance efficient resource allocation for cloud-based data centers
by: Akhter, Nasrin
Published: (2015)
by: Akhter, Nasrin
Published: (2015)
Antecedents of cloud enterprise resources planning implementation and their effects on business financial performance through competitive advantage
by: Olakunle, Jayeola
Published: (2022)
by: Olakunle, Jayeola
Published: (2022)
Developments in the right to be forgotten
by: McGoldrick, Dominic
Published: (2013)
by: McGoldrick, Dominic
Published: (2013)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Minimum separation between lightning protection system and non-integrated metallic structures
by: Fallah, Seyedeh Narjes
Published: (2014)
by: Fallah, Seyedeh Narjes
Published: (2014)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015)
by: Pichan, A., et al.
Published: (2015)
Similar Items
-
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019) -
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018) -
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016) -
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)