You are currently on the new version of our website. Access the old version .

404 Results Found

  • Article
  • Open Access
4 Citations
3,864 Views
26 Pages

19 December 2022

Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment. A multi-domain environment is convenient for managers to supervise and...

  • Concept Paper
  • Open Access
7 Citations
8,529 Views
24 Pages

22 June 2020

Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very litt...

  • Article
  • Open Access
14 Citations
6,099 Views
10 Pages

Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID

  • Bing-Chang Chen,
  • Cheng-Ta Yang,
  • Her-Tyan Yeh and
  • Ching-Chao Lin

29 July 2016

The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which inc...

  • Article
  • Open Access
6 Citations
5,022 Views
30 Pages

Healthcare systems are increasingly vulnerable to security threats due to their reliance on digital platforms. Traditional access control models like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) have limitations in mitig...

  • Article
  • Open Access
32 Citations
4,901 Views
16 Pages

SEMRAchain: A Secure Electronic Medical Record Based on Blockchain Technology

  • Halima Mhamdi,
  • Manel Ayadi,
  • Amel Ksibi,
  • Amal Al-Rasheed,
  • Ben Othman Soufiene and
  • Sakli Hedi

6 November 2022

A medical record is an important part of a patient’s follow-up. It comprises healthcare professionals’ views, prescriptions, analyses, and all information about the patient. Several players, including the patient, the doctor, and the phar...

  • Review
  • Open Access
31 Citations
14,643 Views
28 Pages

Trustworthy AI: Securing Sensitive Data in Large Language Models

  • Georgios Feretzakis and
  • Vassilios S. Verykios

6 December 2024

Large language models (LLMs) have transformed Natural Language Processing (NLP) by enabling robust text generation and understanding. However, their deployment in sensitive domains like healthcare, finance, and legal services raises critical concerns...

  • Article
  • Open Access
2 Citations
2,157 Views
13 Pages

10 July 2023

Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains. One of the critical challenges in RBAC is the efficient assignment of roles to users while...

  • Article
  • Open Access
13 Citations
3,852 Views
17 Pages

1 September 2022

A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interf...

  • Review
  • Open Access
19 Citations
14,659 Views
25 Pages

Cognitive Radio for Smart Grid with Security Considerations

  • Khaled Shuaib,
  • Ezedin Barka,
  • Nedaa Al Hussien,
  • Mohammed Abdel-Hafez and
  • Mahmoud Alahmad

In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possib...

  • Article
  • Open Access
13 Citations
3,260 Views
16 Pages

28 February 2022

Methods of applying deep learning to database protection have increased over the years. To secure role-based access control (RBAC) by learning the mapping function between query features and roles, it is known that the convolutional neural networks c...

  • Article
  • Open Access
25 Citations
9,219 Views
24 Pages

Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model

  • Muhammad Umar Aftab,
  • Zhiguang Qin,
  • Negalign Wake Hundera,
  • Oluwasanmi Ariyo,
  • Zakria,
  • Ngo Tung Son and
  • Tran Van Dinh

15 May 2019

A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is a...

  • Article
  • Open Access
9 Citations
7,436 Views
27 Pages

Building Trust in Conversational AI: A Review and Solution Architecture Using Large Language Models and Knowledge Graphs

  • Ahtsham Zafar,
  • Venkatesh Balavadhani Parthasarathy,
  • Chan Le Van,
  • Saad Shahid,
  • Aafaq Iqbal Khan and
  • Arsalan Shahid

Conversational AI systems have emerged as key enablers of human-like interactions across diverse sectors. Nevertheless, the balance between linguistic nuance and factual accuracy has proven elusive. In this paper, we first introduce LLMXplorer, a com...

  • Article
  • Open Access
10 Citations
4,751 Views
31 Pages

The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain...

  • Article
  • Open Access
33 Citations
7,524 Views
33 Pages

25 January 2022

The area of smart homes is one of the most popular for deploying smart connected devices. One of the most vulnerable aspects of smart homes is access control. Recent advances in IoT have led to several access control models being developed or adapted...

  • Article
  • Open Access
497 Views
20 Pages

EmbryoTrust: A Blockchain-Based Framework for Trustworthy, Secure, and Ethical In Vitro Fertilization Data Management and Fertility Preservation

  • Hessah A. Alsalamah,
  • Shaden F. Al-Qahtani,
  • Ghazlan Al-Arifi,
  • Jana Al-Sadhan,
  • Reema Al-Mutairi,
  • Nahla Bakhamis,
  • Fady I. Sharara and
  • Shada AlSalamah

26 November 2025

Assisted Reproductive Technology (ART), particularly In Vitro Fertilization (IVF), generates highly sensitive medical data classified as Protected Health Information (PHI) under international privacy and data protection laws. Ensuring the secure, tra...

  • Article
  • Open Access
6 Citations
2,315 Views
18 Pages

16 September 2024

In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced. The compone...

  • Article
  • Open Access
55 Citations
10,501 Views
24 Pages

A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach

  • Santiago Figueroa-Lorenzo,
  • Javier Añorga and
  • Saioa Arrizabalaga

14 October 2019

Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millio...

  • Article
  • Open Access
8 Citations
4,700 Views
20 Pages

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities

  • Rubina Ghazal,
  • Ahmad Kamran Malik,
  • Basit Raza,
  • Nauman Qadeer,
  • Nafees Qamar and
  • Sajal Bhatia

22 June 2021

Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments. The reason is its limitations in adapting the dynamically changing in...

  • Review
  • Open Access
7 Citations
7,373 Views
17 Pages

As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the...

  • Article
  • Open Access
20 Citations
4,272 Views
29 Pages

The Design and Implementation of a Secure Datastore Based on Ethereum Smart Contract

  • Izdehar M. Aldyaflah,
  • Wenbing Zhao,
  • Himanshu Upadhyay and
  • Leonel Lagos

23 April 2023

In this paper, we present a secure datastore based on an Ethereum smart contract. Our research is guided by three research questions. First, we will explore to what extend a smart-contract-based datastore should resemble a traditional database system...

  • Article
  • Open Access
2 Citations
1,222 Views
21 Pages

AllianceBlockchain in the Governance Innovation of Internet Hospitals

  • Xiaofeng Wang,
  • Xiaoguang Yue,
  • Ahthasham Sajid and
  • Noshina Tariq

29 December 2024

The rise of Internet hospitals has significant issues associated with data security and governance in managing sensitive patient data. This paper discusses an alliance blockchain (i.e., a private blockchain) model for governance innovation in interne...

  • Article
  • Open Access
3 Citations
1,599 Views
28 Pages

11 May 2025

Internet of Things (IoT) devices have revolutionized real-time monitoring and distant patient care in smart cities’ healthcare systems. However, this advancement has come with several issues, such as data security, scalability, operational effi...

  • Article
  • Open Access
28 Citations
3,891 Views
27 Pages

17 March 2021

Cloud data storage is revolutionary because it eliminates the need for additional hardware, which is often costly, inconvenient, and requires additional space. Cloud data storage allows data owners to store large amounts of data in a flexible way and...

  • Article
  • Open Access
28 Citations
5,416 Views
17 Pages

20 April 2019

Due to the rapid development of Internet of Things (IoT), IoT platforms that can provide common functions for things are becoming increasingly important. However, access control frameworks in diverse IoT platforms have been developed for individual s...

  • Article
  • Open Access
7 Citations
2,621 Views
13 Pages

Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control

  • Ahmed Abdu Alattab,
  • Reyazur Rashid Irshad,
  • Anwar Ali Yahya and
  • Amin A. Al-Awady

31 October 2022

Cloud computing provides a ubiquitous data storage and access mechanism for organizations, industries, and smart grids to facilitate their operations. However, the concern in cloud storage systems is to secure data access control toward authenticatio...

  • Article
  • Open Access
18 Citations
4,796 Views
15 Pages

CaACBIM: A Context-aware Access Control Model for BIM

  • Rongyue Zheng,
  • Jianlin Jiang,
  • Xiaohan Hao,
  • Wei Ren,
  • Feng Xiong and
  • Tianqing Zhu

1 February 2019

A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently,...

  • Article
  • Open Access
50 Citations
6,977 Views
15 Pages

An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain

  • Gabriel Nyame,
  • Zhiguang Qin,
  • Kwame Opuni-Boachie Obour Agyekum and
  • Emmanuel Boateng Sifah

17 February 2020

Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles,...

  • Article
  • Open Access
1,507 Views
37 Pages

7 August 2024

Role-based access control (RBAC) is a widely adopted access control model in various domains for defining security management. Role mining is closely related to role-based access control, as the latter employs role assignments to offer a flexible and...

  • Article
  • Open Access
1 Citations
870 Views
24 Pages

25 July 2025

The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access cont...

  • Article
  • Open Access
1 Citations
3,812 Views
23 Pages

RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments

  • Christina Michailidou,
  • Vasileios Gkioulos,
  • Andrii Shalaginov,
  • Athanasios Rizos and
  • Andrea Saracino

23 May 2020

The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of power, computa...

  • Article
  • Open Access
6 Citations
2,146 Views
28 Pages

MedAccessX: A Blockchain-Enabled Dynamic Access Control Framework for IoMT Networks

  • Guoyi Shi,
  • Minfeng Qi,
  • Qi Zhong,
  • Ningran Li,
  • Wanxin Gao,
  • Lefeng Zhang and
  • Longxiang Gao

17 March 2025

The integration of Internet of Things (IoT) devices in healthcare has enhanced medical efficiency but poses challenges such as data privacy risks and internal abuse. Traditional IoT data access frameworks suffer from centralization, limited scalabili...

  • Article
  • Open Access
9 Citations
3,908 Views
15 Pages

4 November 2022

With the rapid development of digital economics, a large number of data have been accumulated in the supply chain system, and data islands have appeared. Data sharing is an imperative way to unlock the data value of a supply chain system. A safe and...

  • Article
  • Open Access
1 Citations
3,132 Views
22 Pages

Cloud-Based Access Control Including Time and Location

  • Mustafa Al Lail,
  • Marshal Moncivais,
  • Robert Benton and
  • Alfredo J. Perez

Location-based services (LBS) offer various functionalities, but ensuring secure access to sensitive user data remains a challenge. Traditional access control methods often need more detail to enforce location-specific restrictions. This paper propos...

  • Article
  • Open Access
2 Citations
5,887 Views
14 Pages

End-to-End Database Software Security

  • Denis Ulybyshev,
  • Michael Rogers,
  • Vadim Kholodilo and
  • Bradley Northern

29 March 2023

End-to-end security is essential for relational database software. Most database management software provide data protection at the server side and in transit, but data are no longer protected once they arrive at the client software. In this paper, w...

  • Article
  • Open Access
1 Citations
247 Views
30 Pages

26 December 2025

The proliferation of Internet of Things (IoT) applications in safety-critical domains, such as healthcare, smart transportation, and industrial automation, demands robust solutions for data integrity, traceability, and security that surpass the capab...

  • Article
  • Open Access
9 Citations
3,870 Views
31 Pages

4 November 2019

Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constr...

  • Article
  • Open Access
7 Citations
3,908 Views
22 Pages

Privacy-Aware and Secure Decentralized Air Quality Monitoring

  • Michael Mrissa,
  • Aleksandar Tošić,
  • Niki Hrovatin,
  • Sidra Aslam,
  • Balázs Dávid,
  • László Hajdu,
  • Miklós Krész,
  • Andrej Brodnik and
  • Branko Kavšek

18 February 2022

Indoor Air Quality monitoring is a major asset to improving quality of life and building management. Today, the evolution of embedded technologies allows the implementation of such monitoring on the edge of the network. However, several concerns need...

  • Article
  • Open Access
5 Citations
4,412 Views
21 Pages

19 September 2019

Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bott...

  • Proceeding Paper
  • Open Access

7 November 2025

Cardiovascular diseases (CVDs) are a major cause of global mortality, underscoring the need for intelligent and accessible cardiac health monitoring. This paper proposes a non-wearable Internet-of-Medical-Things (IoMT) system combining real-time sens...

  • Article
  • Open Access
413 Views
19 Pages

19 December 2025

Large Language Models (LLMs) have demonstrated significant potential in transforming software testing by automating tasks such as test case generation. In this work, we explore the integration of LLMs within a Model-Driven Engineering (MDE) approach...

  • Article
  • Open Access
523 Views
31 Pages

A Digital Health Platform for Remote and Multimodal Monitoring in Neurodegenerative Diseases

  • Adrian-Victor Vevera,
  • Marilena Ianculescu and
  • Adriana Alexandru

13 December 2025

Continuous and personalized monitoring are beneficial for patients suffering from neurodegenerative diseases such as Alzheimer’s disease, Parkinson’s disease and multiple sclerosis. However, such levels of monitoring are seldom ensured by...

  • Article
  • Open Access
4 Citations
1,992 Views
19 Pages

28 December 2023

With the growing emphasis on privacy awareness, there is an increasing demand for privacy-preserving encrypted image retrieval and secure image storage on cloud servers. Nonetheless, existing solutions exhibit certain shortcomings regarding retrieval...

  • Article
  • Open Access
4 Citations
2,589 Views
22 Pages

18 July 2023

Model evaluation is critical in deep learning. However, the traditional model evaluation approach is susceptible to issues of untrustworthiness, including insecure data and model sharing, insecure model training, incorrect model evaluation, centraliz...

  • Feature Paper
  • Article
  • Open Access
164 Citations
14,310 Views
27 Pages

While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is critical in re...

  • Article
  • Open Access
4 Citations
3,442 Views
23 Pages

14 June 2023

Organisations are adopting new IT strategies such as “Bring Your Own Device” (BYOD) and remote working. These trends are highly beneficial both for enterprise owners and employees in terms of increased productivity and reduced costs. Howe...

  • Article
  • Open Access
2,667 Views
25 Pages

The integration of blockchain technology into healthcare offers a robust solution to challenges in secure data sharing, privacy protection, and operational efficiency. Effective exchange of sensitive patient information among hospitals, clinics, insu...

  • Article
  • Open Access
2 Citations
1,149 Views
34 Pages

Cloud computing has witnessed rapid growth and notable technological progress in recent years. Nevertheless, it is still regarded as being in its early developmental phase, with substantial potential remaining to be explored—particularly throug...

  • Article
  • Open Access
447 Views
27 Pages

11 November 2025

The rapid rise of virtual hospitals has created an urgent need for secure, interoperable, and patient-centered (PC) access to medical data across distributed healthcare environments. However, most existing hospital information systems and electronic...

  • Article
  • Open Access
9 Citations
3,675 Views
22 Pages

26 October 2021

Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access. This is particular...

  • Article
  • Open Access
1 Citations
1,021 Views
16 Pages

17 August 2025

In the context of modern healthcare, the integration of sensor networks into electronic health record (EHR) systems introduces new opportunities and challenges related to data privacy, security, and interoperability. This paper proposes a secure dist...

of 9