Browsing by Subject "Security"
Now showing items 1-15 of 15
-
Conference Object
Data protection issues of integrated Electronic Health Records (EHR)
(Springer Verlag, 2016)An Electronic Health Record (EHR) of a patient in perspective maintains the medical history of the citizen electronically in medical databanks serviced locally or is cloud based. The ownership and the access control should ...
-
Article
Education, risk and ethics
(Routledge, 2006)While the notion of risk remains under-theorised in moral philosophy, risk aversion and moralist self-protection appear as dominant cultural tendencies saturating educational orientation and practice. Philosophy of education ...
-
Article
How many attackers can selfish defenders catch?
(2013)In a distributed system with attacks and defenses, both attackers and defenders are self-interested entities. We assume a reward-sharing scheme among interdependent defenders
-
Conference Object
Human Mobility Computing and Privacy: Fad or Reality?
(Institute of Electrical and Electronics Engineers Inc., 2015)The advent of mobile computing and sensing technologies, in conjunction with omni-present and high-speed mobile networks, allow nowadays the capture of human mobility data at an extremely high fidelity. Modern mobile ...
-
Conference Object
Investigating the resolution of vulnerable dependencies with dependabot security updates
(IEEE, 2023)Modern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. ...
-
Conference Object
A national Electronic Health Record System for Cyprus
(Springer Verlag, 2014)This paper presents part of the work done for the "Electronic Health Record (EHR) at National Level project" under the Framework Program for Research, Technological Development and Innovation 2009-2010 of the Research ...
-
Article
A network game with attackers and a defender
(2008)Consider an information network with threats called attackers
-
Conference Object
A novel 3-d model for node and system trust
(2011)Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically ...
-
Article
Opacity-enforcing supervisory strategies via state estimator constructions
(2012)State-based notions of opacity, such as initial-state opacity and infinite-step opacity, emerge as key properties in numerous security applications of discrete event systems. We consider systems that are modeled as partially ...
-
Article
-
Conference Object
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
(2012)Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Article
Security in the cache and forward architecture for the next generation Internet
(2011)The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network ...
-
Article
A survey on secure multipath routing protocols in WSNs
(2010)Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN ...