User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 17
 Downloands 8
Cloud methods electronic health services (EHS), for improving cyber security and privacy data, suggest solutions for unauthorized access issue
2021
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

in 2020 was certainly not a traditional year. The pandemic make huge pressures on cyber security, IOT, leaders and businesses were forced to rapidly accelerate their digital transformation plans and massively expand their remote working capabilities. Cyber actors seized the opportunities created by the pandemic and exploited vulnerabilities in security defenses to gain access to business networks and sensitive data. In 2020, phishing and ransomware attacks increased, as did web application attacks, according to the recently published Verizon 2021 Data Breach Investigations Report. The report provides insights into the tactics, techniques and procedures used by nation state actors and cybercriminal groups and how these changed during the pandemic. To improve the cloud security, I used very important methods, in my proposal system very secure devices that contribute to reduce or avoid for illegal access cloud computing , all medical services ,must be secure ( store , transfer). In this paper, we propose new EHS sharing framework that combines modern technology and the centralized system on a cloud platform. Particularly, we design atrustworthy access control mechanism using smart contracts to achieve secure EHRs sharing among differentpatients and medical providers

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 103
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education