Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Privacy And Security Issues In Iot Healthcare Applications For The Disabled Users A Survey, Wassnaa Al-Mawee
Privacy And Security Issues In Iot Healthcare Applications For The Disabled Users A Survey, Wassnaa Al-Mawee
Masters Theses
Aging of the population resulted in new challenges for the society and healthcare systems. Ambient Assisted Living (AAL) that depends on Internet of Things (IoT) provides assistance to the disabled people and supports their vital daily life activities. Affordability of and accessibility to AAL and the usage of IoT starts revolutionizing healthcare services. This Thesis is a survey of the privacy and security issues in IoT healthcare applications for the disabled users. Introduction includes definitions of privacy and security terms, and discusses their relationship. Then, it presents an overview of the IoT, including its architecture and components. Next, the Thesis …
Security On Medical Wireless Sensor Networks, Eric D. Southern
Security On Medical Wireless Sensor Networks, Eric D. Southern
Electronic Thesis and Dissertation Repository
Wireless technology is fast becoming a very important tool for all aspects of communication. An area that lacks a strong implementation for wireless communication is the medical field. Wireless systems could be used by clinicians to be better able to diagnose and monitor patients. The reason behind the lack of adoption in healthcare is due to the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. The current methods of wireless authentication are investigated and an existing issue in mobile networks is described and solved with two novel solutions; one solution within …
A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell
A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell
All Capstone Projects
This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff)
Towards An Incentive Compatible Framework Of Secure Cloud Computing, Yulong Zhang
Towards An Incentive Compatible Framework Of Secure Cloud Computing, Yulong Zhang
Theses and Dissertations
Cloud computing has changed how services are provided and supported through the computing infrastructure. It has the advantages such as flexibility , scalability , compatibility and availability . However, the current architecture design also brings in some troublesome problems, like the balance of cooperation benefits and privacy concerns between the cloud provider and the cloud users, and the balance of cooperation benefits and free-rider concerns between different cloud users. Theses two problems together form the incentive problem in cloud environment. The first conflict lies between the reliance of services and the concerns of secrets of cloud users. To solve it, …
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Graduate Theses and Dissertations
The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that insiders get throughout legal accesses, and it concentrates on analyzing the dependencies and constraints among data items and represents them using graph-based methods. The dissertation proposes new types of Knowledge Graphs (KGs) to represent insiders' knowledgebases. Furthermore, it introduces the Neural Dependency and Inference Graph (NDIG) and Constraints and Dependencies Graph (CDG) to demonstrate the dependencies and constraints among data items. The dissertation discusses in detail how insiders use knowledgebases and dependencies and constraints to get …
Networking And Security Solutions For Vanet Initial Deployment Stage, Baber Aslam
Networking And Security Solutions For Vanet Initial Deployment Stage, Baber Aslam
Electronic Theses and Dissertations
Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called "smart vehicles") are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other …