IoT Performability for Medical Wearable Device by Data Privacy and Fault Tolerance
暂无分享,去创建一个
George Suciu | Raluca Maria Aileni | Sever Pasca | Carlos Valderrama | G. Suciu | S. Pasca | R. Aileni | C. Valderrama
[1] Leandro Navarro-Moldes,et al. 5G and the Internet of EveryOne: Motivation, Enablers, and Research Agenda , 2018, 2018 European Conference on Networks and Communications (EuCNC).
[2] Vipin Kumar,et al. Mining Electronic Health Records: A Survey , 2017, 1702.03222.
[3] Josep Domingo-Ferrer,et al. Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion , 2017, Trans. Data Priv..
[4] K. S. Angel Viji,et al. A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features , 2017, Int. J. Commun. Networks Inf. Secur..
[5] Zaigham Mahmood,et al. Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective , 2016 .
[6] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[7] P. Deepa Shenoy,et al. Generic CBTS: Correlation based Transformation Strategy for Privacy Preserving Data Mining , 2017 .
[8] Fabian Prasser,et al. SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees , 2018, Proc. Priv. Enhancing Technol..
[9] Qiang Ni,et al. A K-Anonymity Based Schema for Location Privacy Preservation , 2019, IEEE Transactions on Sustainable Computing.
[10] George Pallis,et al. Healthcare Informatics and Privacy , 2018, IEEE Internet Comput..
[11] Qing-Qing Xie,et al. Personalized extended (α, k)‐anonymity model for privacy‐preserving data publishing , 2017, Concurr. Comput. Pract. Exp..
[12] George Suciu,et al. Analysis of the security solutions implemented in current Internet of Things platforms , 2015, 2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG).
[13] Simson L. Garfinkel,et al. De-Identification of Personal Information , 2015 .
[14] Akihiko Ohsuga,et al. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness , 2019, IEEE Transactions on Dependable and Secure Computing.
[15] Joshua Snoke,et al. General and specific utility measures for synthetic data , 2016, 1604.06651.
[16] Matthias Templ,et al. Statistical Disclosure Control for Microdata: Methods and Applications in R , 2017 .
[17] Philip S. Yu,et al. Privacy Preserving Utility Mining: A Survey , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[18] Zaigham Mahmood. Connectivity Frameworks for Smart Devices , 2016, Computer Communications and Networks.
[19] Raluca Maria Aileni,et al. Chapter 10 – Wearable Electronics for Elderly Health Monitoring and Active Living , 2017 .
[20] Kuo-Hui Yeh,et al. Novel Authentication Schemes for IoT Based Healthcare Systems , 2015, Int. J. Distributed Sens. Networks.
[21] Pierangela Samarati,et al. Cloud Security: Issues and Concerns , 2016 .
[22] Sherali Zeadally,et al. Privacy in a Digital, Networked World: Technologies, Implications and Solutions , 2015 .
[23] Fabian Prasser,et al. A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data , 2018, IEEE Journal of Biomedical and Health Informatics.
[24] Victor I. Chang,et al. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..
[25] Amit P. Sheth,et al. Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.
[26] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[27] Josep Domingo-Ferrer,et al. Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections , 2016, Database Anonymization.
[28] Fang Liu,et al. Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.
[29] Baoli Ma,et al. Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT , 2018, IEEE Internet of Things Journal.
[30] Gauri Sankar Datta,et al. Statistical disclosure control via sufficiency under the multiple linear regression model , 2018 .
[31] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[32] Fabian Prasser,et al. A Generic Method for Assessing the Quality of De-Identified Health Data , 2016, MIE.
[33] Fabian Prasser,et al. A Tool for Optimizing De-identified Health Data for Use in Statistical Classification , 2017, 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS).
[34] Hwaiyu Geng,et al. Internet of Things and Data Analytics Handbook , 2017 .
[35] Sherali Zeadally,et al. Privacy in a Digital, Networked World , 2015, Computer Communications and Networks.
[36] Fabian Prasser,et al. An Experimental Comparison of Quality Models for Health Data De-Identification , 2017, MedInfo.