Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. In this case confidential data might be intercepted or read by hackers. We cannot consider any cen...
محفوظ في:
| المؤلف الرئيسي: | Haraty, Ramzi A. (author) |
|---|---|
| مؤلفون آخرون: | Zbib, Mirna (author), Masud, Mehedi (author) |
| التنسيق: | article |
| منشور في: |
2016
|
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/5127 http://dx.doi.org/10.1007/s12083-015-0361-z http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://link.springer.com/article/10.1007/s12083-015-0361-z |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
مواد مشابهة
-
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
حسب: Haraty, Ramzi A.
منشور في: (2007) -
Damage assessment & recovery from malicious transactions using data dependency for deffensive information warfare. (c2006)
حسب: Zeitunlian, Arda
منشور في: (2006) -
A matrix-based damage assessment and recovery algorithm
حسب: Haraty, Ramzi A.
منشور في: (2014) -
Efficient Damage Assessment and Recovery Using Fast Mapping
حسب: Haraty, Ramzi A.
منشور في: (2014) -
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
حسب: Haraty, Ramzi A.
منشور في: (2015)