5 results

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks

Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...

An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology

Conference Proceeding
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E., & Thuemmler, C. (2014)
An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/bibe.2013.6701578
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds

Conference Proceeding
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013)
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. https://doi.org/10.1109/itng.2013.77
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Conference Proceeding
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006)
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...