Refine
Year of publication
Document type
- Conference Proceeding (26)
- Article (peer-reviewed) (5)
- Part of a Book (1)
Language
- English (32)
Is part of the Bibliography
- Yes (32)
Keywords
- Cloud computing (9)
- Security (9)
- Privacy (5)
- Audit (3)
- Computer architecture (3)
- Docker (3)
- Monitoring (3)
- Agents (2)
- Cloud security (2)
- Container virtualization (2)
- Data privacy (2)
- Digital evidence (2)
- Digital technologies (2)
- Generative models (2)
- Hardware (2)
- OSGi (2)
- Pix2Pix (2)
- Simulation modeling (2)
- Supply chain planning (2)
- System call tracing (2)
- System dynamics (2)
- AAL (1)
- Access control (1)
- Access-control (1)
- Accountability (1)
- Agile method (1)
- Algorithmic decision-making (1)
- Ambient assisted living (1)
- Anomalous behavior (1)
- Anomalous behaviour (1)
- Augmentation (1)
- Autonomous agents (1)
- Big data (1)
- Big data analytics (1)
- Biological neural networks (1)
- Business (1)
- Care flow (1)
- Cloud (1)
- Cloud audit (1)
- Cloud audits (1)
- Complex event data (1)
- Container (1)
- Context aware (1)
- Data driven decision making (1)
- Data flow (1)
- Data-driven decisions (1)
- Digital transformation (1)
- Distributed OSGi (1)
- Emergency-situations (1)
- Federated cloud (1)
- HPC (1)
- Health insurance (1)
- Hybrid Cloud (1)
- Hyperparameter tuning (1)
- Iraq (1)
- Load Balancing (1)
- Machine learning (1)
- Mathematical model (1)
- Metalworking (1)
- Metrics (1)
- Mobile Internet Services (1)
- Model-driven architecture (1)
- Model-driven development (1)
- Neural net-works (1)
- OSGi Service Architecture (1)
- PaaS (1)
- PaaS Management (1)
- Peer-reviewed of the scientific committee (1)
- Prediction (1)
- Predictive simulation (1)
- Process mining (1)
- Process model (1)
- QoS (1)
- Quality of Service (1)
- Quality assessment (1)
- Quantifying value of data (1)
- SLA (1)
- SaaS (1)
- Security Audit as a Service (1)
- Security monitoring (1)
- Security policies (1)
- Software engineering (1)
- Storage (1)
- Supply chain management (1)
- Training (1)
- Trust (1)
- UML (1)
- Uncertainty (1)
- Universal image quality index (1)
- Virtual machining (1)
- Virtualization (1)
Understanding Cloud Audits
(2012)
AAL applications are designed for elderly people and collecting personally identifiable information (PII), e.g. health data. During normal operations, these data should be kept private. But during emergency situations, the information is critical for helpers and emergency doctors. This paper discusses the results of a survey conducted for PII in AAL and proofs the requirement of special access control rules for systems in situations of emergency.
Software Defined Privacy
(2017)
Software Defined Privacy
(2016)