Author:
Singh Ashutosh Kumar,Gupta Ishu
Funder
University Grants Commission
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference38 articles.
1. Al-Fedaghi S, Behbehani M (2018) Thinging machine applied to information leakage. Int J Adv Comput Sci Appl (IJACSA) 9(9):101–110
2. Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2017) Sedasc: Secure data sharing in clouds. IEEE Syst J 11(2):395–404
3. Assale M, Dui LG, Cina A, Seveso A, Cabitza F (2019) The revival of the notes field: Leveraging the unstructured content in electronic health records. Front Med 6:1–23
4. Backes M, Grimm N, Kate A (2016) Data lineage in malicious environments. IEEE Trans Depend Sec Comput 13(2):178–191
5. Bertino E (2013) Data security–challenges and research opportunities. In: Workshop on secure data management. Springer, pp 9–13
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献