Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1155/2015/914305
|View full text |Cite
|
Sign up to set email alerts
|

Tracking and Repairing Damaged Healthcare Databases Using the Matrix

Abstract: In a distributed mobile e-health care system, e-health service providers exchange data on the fly in response to user queries without any centralized control. Local databases in e-health service providers might be intercepted during the exchange of data and read by intruders; and malicious transactions may damage data that is highly confidential. In this case any centralized control for securing data cannot be assumed to protect confidential data. Therefore, securing health information from malicious attacks h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(31 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…The use of a single 2D matrix helps store dependencies between transactions by identifying the affected segment of the database. Kaddoura et al [2] recommended also the use of a single matrix for damage assessment and recovery of algorithms.…”
Section: Data Integrity In Fog Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of a single 2D matrix helps store dependencies between transactions by identifying the affected segment of the database. Kaddoura et al [2] recommended also the use of a single matrix for damage assessment and recovery of algorithms.…”
Section: Data Integrity In Fog Computingmentioning
confidence: 99%
“…As a solution to cloud computing performance related issues, e.g., high response time and real time data processing [1], CISCO introduced fog computing in 2012 , as multiple clouds are deployed close to the ground. This promising technology (i.e., fog computing) enables end users to utilize computing and processing services at the edge of the network [2], which in turn reduces the response time and the computation overhead to the cloud data centers. Additionally, many studies predicted that the number of connected IoT devices would be increased to exceed billions of devices.…”
Section: Introductionmentioning
confidence: 99%
“…The work done in (Haraty et al, , 2018Haraty and Sai, 2017;Haraty and Zbib, 2014;Haraty et al, 2016;Kaddoura et al, 2015) reduced the number of data structures utilized by the damage assessment algorithm. Transaction dependency approaches was utilized in both Haraty and Sai, 2017).…”
Section: Matrices In Recoverymentioning
confidence: 99%
“…Transaction dependency approaches was utilized in both Haraty and Sai, 2017). On the other hand, other papers (Haraty et al, 2018;Haraty and Zbib, 2014;Haraty et al, 2016;Kaddoura et al, 2015) utilized the data dependency paradigm for assessing the damage.…”
Section: Matrices In Recoverymentioning
confidence: 99%
See 1 more Smart Citation