Select Page

UC Design and Implementation of A Cybersecurity Discussion

Question Description

Design and implementation cybersecurity based signcryption technique to increase the data confidentiality and integrity level in a distributed database system

Challa, S., Das, A.K., Gope, P., Kumar, N., Wu, F. & Vasilakos, A. V. (2020). Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Future Generation Computer Systems. [Online]. 108. pp. 1267–1286. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X17326328.

Colorafi, K. & Bailey, B. (2016). It’s time for innovation in the Health Insurance Portability and Accountability Act (HIPAA). JMIR medical informatics. [Online]. 4 (4). pp. e34. Available from: https://medinform.jmir.org/2016/4/e34.

Greg, P., Trevors, M. & Vrtis, R.A. (2018). A mapping of the health insurance portability and accountability act (HIPAA) security rule to the cyber resilience review (CRR). [Online]. CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH United States. Available from: http://refhub.elsevier.com/S1084-8045(20)30116-8/sref38.

Imine, Y., Lounis, A. & Bouabdallah, A. (2020). An accountable privacy-preserving scheme for public information sharing systems. Computers & Security. [Online]. 93. pp. 101786. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0167404820300717.

Li, J., Gao, W., Zuo, W. & Liu, X. (2017). Association between rs17095355 polymorphism on 10q24 and susceptibility to biliary atresia: a meta-analysis. The Journal of Maternal-Fetal & Neonatal Medicine. [Online]. 30 (15). pp. 1882–1886. Available from: https://www.tandfonline.com/doi/full/10.1080/14767058.2016.1228102.

Liu, Z., Yan, H. & Li, Z. (2015). Server-aided anonymous attribute-based authentication in cloud computing. Future Generation Computer Systems. [Online]. 52. pp. 61–66. Available from: https://www.sciencedirect.com/science/article/pii/S0167739X14002544.

Mohana Prabha, K. & Vidhya Saraswathi, P. (2020). Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing. Computer Communications. [Online]. 158. pp. 85–94. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0140366420303844.

Nigoti, R., Jhuria, M. & Singh, S. (2013). A survey of cryptographic algorithms for cloud computing. [Online]. Citeseer. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.60.

Song, J. & Moon, Y. (2020). Security Enhancement Against Insiders in Cyber-Manufacturing Systems. Procedia Manufacturing. [Online]. 48. pp. 864–872. Available from: https://linkinghub.elsevier.com/retrieve/pii/S2351978920315766.

Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications. [Online]. 160. pp. 102642. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1084804520301168.

Wu, M. & Moon, Y. (2018). DACDI (Define, Audit, Correlate, Disclose, and Improve) framework to address cyber-manufacturing attacks and intrusions. Manufacturing Letters. [Online]. 15. pp. 155–159. Available from: https://www.sciencedirect.com/science/article/pii/S2213846317300858.

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now