Showing 1 - 6 results of 6 for search '"data protection"', query time: 0.06s Refine Results
  1. 1

    Securing Big Data Processing With Homomorphic Encryption by Tan, Soo Fun, Azman Samsudin, Suraya Alias

    Published 2020
    “…The arrival of Big Data era has challenged the conventional end-to-end data protection mechanism due to its associated high volume, velocity and variety characteristics. …”
    Get full text
    Get full text
    Article
  2. 2

    Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment by Tan Soo Fun, Azman Samsudin

    Published 2016
    “…This paper proposed the Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) scheme for providing an end-to end data protection in multi-users cloud environments. The proposed KP-ABFHE scheme is able to perform the computation while providing fine-grained access on the encrypted data. …”
    Get full text
    Get full text
    Article
  3. 3

    A survey of homomorphic encryption for outsourced big data by Tan, Soo Fun, Azman Samsudin

    Published 2016
    “…This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. …”
    Get full text
    Get full text
    Article
  4. 4

    Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey by Tan, Soo Fun, Azman Samsudin

    Published 2021
    “…Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.…”
    Get full text
    Get full text
    Article
  5. 5

    Driving the development of SMES’ entrepreneurs in the era of digitalisation: From the dynamic perspective of law enforcement in Malaysia by Irma Wani Othman, Salmah Topimin, Siti Nor Bayaah Ahmad, Haslinda Hasan

    Published 2021
    “…Reflection on the accuracy of other acts such as (i) Trade Descriptions Act 2011 (Act 730), (ii) and Price Control and Anti-Profiteering Act 2011 (Act 732), (iii) Business Registration Act 1956, (iv) Electronic Commerce Act or known (Act 658, (v) Computer Crimes Act 1997, (vi) The Personal Data Protection Act 2010 (Act 709), and (vii) Communications and Multimedia Act 1998 are analysed and blended with current legal issues discussed. …”
    Get full text
    Get full text
    Article
  6. 6

    Synthesisation of diverse and photorealistic lung images for lung diseases recognition using deep learning techniques by Lee Kin Wai

    Published 2023
    “…However, newly emerged problems such as the ongoing COVID-19 pandemic have underscored the challenge of acquiring a larger corpus of data during the early stages of the pandemic due to the availability of samples, data protection policies, labour, and facility resources. …”
    Get full text
    Get full text
    Thesis