Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. In this case confidential data might be intercepted or read by hackers. We cannot consider any cen...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| التنسيق: | article |
| منشور في: |
2016
|
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/5127 http://dx.doi.org/10.1007/s12083-015-0361-z http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://link.springer.com/article/10.1007/s12083-015-0361-z |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|