Secure Edge Computing 2021
DOI: 10.1201/9781003028635-2
|View full text |Cite
|
Sign up to set email alerts
|

Secure Fog-Cloud of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…On the other hand, privacy is defined as protecting sensitive information from unauthorized disclosure, such as PII included with medical data. Further privacy is mainly focused on developing appropriate policies and authentication and authorization procedures towards guaranteeing that patient private data are collected, shared, and used appropriately [20][21][22][23]45].…”
Section: Data Consumption and Sharingmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, privacy is defined as protecting sensitive information from unauthorized disclosure, such as PII included with medical data. Further privacy is mainly focused on developing appropriate policies and authentication and authorization procedures towards guaranteeing that patient private data are collected, shared, and used appropriately [20][21][22][23]45].…”
Section: Data Consumption and Sharingmentioning
confidence: 99%
“…Real-time security analytics Because of the increasing threats, analyzing security and privacy threats and forecasting threat sources in real-time is critical in the healthcare industry. The healthcare business is currently dealing with a slew of sophisticated threats, including ransomware, Distributed Denial of Service (DDoS), and all sorts of malware [10,13,45]. Furthermore, social engineering attacks are becoming more common, and the hazards associated with them are difficult to forecast without taking human cognitive behavior into account.…”
mentioning
confidence: 99%