Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique
暂无分享,去创建一个
[1] Costas Lambrinoudakis,et al. Cryptography Goes to the Cloud , 2011, STA Workshops.
[2] Farhana Ahad,et al. Information hiding in medical images: a robust medical image watermarking system for E-healthcare , 2017, Multimedia Tools and Applications.
[3] Javaid A. Sheikh,et al. Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..
[4] Kyungho Jeon,et al. The HybrEx Model for Confidentiality and Privacy in Cloud Computing , 2011, HotCloud.
[5] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[6] Gang Ren,et al. Source Address Validation: Architecture and Protocol Design , 2007, 2007 IEEE International Conference on Network Protocols.
[7] Thomas Engel,et al. Verification of Data Location in Cloud Networking , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[8] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[9] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[10] Ahmad-Reza Sadeghi,et al. Securing the e-health cloud , 2010, IHI.
[11] Farhana Ahad,et al. A New Reversible and high capacity data hiding technique for E-healthcare applications , 2017, Multimedia Tools and Applications.
[12] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[13] Mamoon Rashid,et al. Securing Data Storage By Extending Role-Based Access Control , 2013, Int. J. Cloud Appl. Comput..
[14] Alfredo De Santis,et al. Device Tracking in Private Networks via NAPT Log Analysis , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[15] Mehmet Hadi Gunes,et al. Enhancing data privacy and integrity in the cloud , 2011, 2011 International Conference on High Performance Computing & Simulation.
[16] Sushil Jajodia,et al. Privacy of data outsourced to a cloud for selected readers through client-side encryption , 2011, WPES '11.
[17] Hassan A. Aziz,et al. Cloud Computing and Healthcare Services , 2016 .
[18] Guan Yong,et al. Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[19] D. Turgay Altilar,et al. Cloud-based E-health systems: Security and privacy challenges and solutions , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[20] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[21] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.