Al-Abdullah et al., 2017 - Google Patents
Securing Humanitarian Information Exchange: A Mediator-Wrapper ArchitectureAl-Abdullah et al., 2017
View PDF- Document ID
- 5335914681915082441
- Author
- Al-Abdullah M
- Roland Weistroffer H
- Sidaoui M
- Publication year
External Links
Snippet
Reliable and secure information exchange, which is crucial for successful response to crisis by humanitarian organizations, requires the responding groups to swiftly organize themselves in new and dynamic ways. Within these resulting impromptu structures …
- 238000004891 communication 0 abstract description 13
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12093426B2 (en) | Systems and methods for functionally separating heterogeneous data for analytics, artificial intelligence, and machine learning in global data ecosystems | |
US11790117B2 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
CN111149332B (en) | System and method for implementing centralized privacy controls in a decentralized system | |
US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US20230054446A1 (en) | Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
US9639594B2 (en) | Common data model for identity access management data | |
US20190364051A1 (en) | Organization based access control system | |
US11775681B2 (en) | Enforcement flow for pipelines that include entitlements | |
EP4121866B1 (en) | Compliant entity conflation and access | |
WO2019246568A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
US11954233B2 (en) | Chaining, triggering, and enforcing entitlements | |
Kagal et al. | Developing secure agent systems using delegation based trust management | |
Bakir | New blockchain based special keys security model with path compression algorithm for big data | |
Khan et al. | BlockU: Extended usage control in and for Blockchain | |
Fabian et al. | Secure federation of semantic information services | |
Kudra et al. | Digital Identity Wallets: A Guide to the EU’s New Identity Model | |
Al-Abdullah et al. | Securing Humanitarian Information Exchange: A Mediator-Wrapper Architecture | |
Villareal | Factors influencing the adoption of zero-trust decentralized identity management solutions | |
US12417317B1 (en) | Systems and methods for dynamic de-identification and anonymity for user input to artificial intelligence (AI)-based models | |
Chivers | Security design analysis | |
Zenden | The identity mangement solution that improves data sharing in logistics | |
Ali et al. | BlockU: Extended usage control in and for Blockchain | |
Sanjalawe et al. | An evaluation of identity and access management systems | |
Morovat | Designing Secure Access Control Model in Cyber Social Networks |