Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
Computer Science Faculty Publications
This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible security issues and how they can be addressed. Finally, a comparison of the major security issues in each architecture is presented to help determine which is most adaptable to meet the security needs of cyber-physical systems in healthcare.
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Computer Science Faculty Publications
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized …