Refine
Year of publication
Document type
- Conference Proceeding (20)
- Article (peer-reviewed) (2)
- Part of a Book (1)
Language
- English (23)
Is part of the Bibliography
- Yes (23)
Keywords
- Cloud computing (9)
- Security (9)
- Privacy (5)
- Audit (3)
- Computer architecture (3)
- Docker (3)
- Monitoring (3)
- Agents (2)
- Cloud security (2)
- Container virtualization (2)
- Data privacy (2)
- Digital evidence (2)
- Generative models (2)
- Hardware (2)
- OSGi (2)
- Pix2Pix (2)
- System call tracing (2)
- AAL (1)
- Access control (1)
- Access-control (1)
- Accountability (1)
- Ambient assisted living (1)
- Anomalous behavior (1)
- Anomalous behaviour (1)
- Augmentation (1)
- Autonomous agents (1)
- Biological neural networks (1)
- Business (1)
- Cloud (1)
- Cloud audit (1)
- Cloud audits (1)
- Container (1)
- Context aware (1)
- Data flow (1)
- Distributed OSGi (1)
- Emergency-situations (1)
- Federated cloud (1)
- HPC (1)
- Hybrid Cloud (1)
- Hyperparameter tuning (1)
- Load Balancing (1)
- Mathematical model (1)
- Metalworking (1)
- Metrics (1)
- Neural net-works (1)
- OSGi Service Architecture (1)
- PaaS (1)
- PaaS Management (1)
- Peer-reviewed of the scientific committee (1)
- Prediction (1)
- QoS (1)
- Quality assessment (1)
- SLA (1)
- SaaS (1)
- Security Audit as a Service (1)
- Security monitoring (1)
- Security policies (1)
- Storage (1)
- Training (1)
- Trust (1)
- Universal image quality index (1)
- Virtual machining (1)
- Virtualization (1)
Understanding Cloud Audits
(2012)
Software Defined Privacy
(2017)
Software Defined Privacy
(2016)
AAL applications are designed for elderly people and collecting personally identifiable information (PII), e.g. health data. During normal operations, these data should be kept private. But during emergency situations, the information is critical for helpers and emergency doctors. This paper discusses the results of a survey conducted for PII in AAL and proofs the requirement of special access control rules for systems in situations of emergency.