|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
Yolanda Valdés-Rodríguez, Jorge Hochstetter-Diez, Jaime Díaz-Arancibia and Rodrigo Cadena-Martínez
Software development must be based on more than just the experience and capabilities of your programmers and your team. The importance of obtaining a quality product lies in the risks that can be exploited by software vulnerabilities, which can jeopardiz...
ver más
|
|
|
|
|
|
Emily Kate Parsons, Emmanouil Panaousis, George Loukas and Georgia Sakellari
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance of s...
ver más
|
|
|
|
|
|
Ronald Maharaj, Sushil Kumar, Nicholas Rollings and Andreas Antoniou
A geophysical method, electrical resistivity tomography, was applied to identify potential groundwater-bearing zones around Nubutautau village on Viti Levu island, Fiji. Apparent resistivity data of the subsurface were collected through an electrode asse...
ver más
|
|
|