Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Attribute-Based Encryption for Secure Access Control in Personal Health Records

    Dakshnamoorthy Manivannan*

    Computer Systems Science and Engineering, Vol.49, pp. 533-555, 2025, DOI:10.32604/csse.2025.072267 - 08 December 2025

    Abstract Attribute-based Encryption (ABE) enhances the confidentiality of Electronic Health Records (EHR) (also known as Personal Health Records (PHR)) by binding access rights not to individual identities, but to user attribute sets such as roles, specialties, or certifications. This data-centric cryptographic paradigm enables highly fine-grained, policy-driven access control, minimizing the need for identity management and supporting scalable multi-user scenarios. This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade. It explores the evolution of these schemes, analyzing their design principles, strengths, limitations, and the level of More >

  • Open Access

    REVIEW

    Attribute-Based Encryption Methods That Support Searchable Encryption

    Daskshnamoorthy Manivannan*

    Journal of Cyber Security, Vol.7, pp. 505-531, 2025, DOI:10.32604/jcs.2025.072810 - 28 November 2025

    Abstract Attribute-Based Encryption (ABE) secures data by linking decryption rights to user attributes rather than user identities, enabling fine-grained access control. While ABE is effective for enforcing access policies, integrating it with Searchable Encryption (SE)—which allows searching encrypted data without decryption—remains a complex challenge. This paper presents a comprehensive survey of ABE schemes that support SE proposed over the past decade. It critically analyzes their strengths, limitations, and access control capabilities. The survey offers insights into the security, efficiency, and practical applicability of these schemes, outlines the current landscape of ABE-integrated SE, and identifies key challenges More >

  • Open Access

    ARTICLE

    DPZTN: Data-Plane-Based Access Control Zero-Trust Network

    Jingfu Yan, Huachun Zhou*, Weilin Wang

    Computer Systems Science and Engineering, Vol.49, pp. 499-531, 2025, DOI:10.32604/csse.2025.068151 - 10 October 2025

    Abstract The 6G network architecture introduces the paradigm of Trust + Security, representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement. While ZTNs (zero-trust networks) have demonstrated significant advancements in constructing trust-centric frameworks, most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities. Furthermore, current ZTN designs generally do not facilitate dynamic assessment of user reputation. To address these limitations, this study proposes a DPZTN (Data-plane-based Zero Trust Network). DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane. Additionally, blockchain infrastructure… More > Graphic Abstract

    DPZTN: Data-Plane-Based Access Control Zero-Trust Network

  • Open Access

    ARTICLE

    An Energy-Efficient Cross-Layer Clustering Approach Based on Gini Index Theory for WSNs

    Deyu Lin1,2, Yujie Zhang 2, Zhiwei Hua2, Jianfeng Xu2,3,*, Yufei Zhao1, Yong Liang Guan1

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1859-1882, 2025, DOI:10.32604/cmc.2025.066283 - 29 August 2025

    Abstract Energy efficiency is critical in Wireless Sensor Networks (WSNs) due to the limited power supply. While clustering algorithms are commonly used to extend network lifetime, most of them focus on single-layer optimization. To this end, an Energy-efficient Cross-layer Clustering approach based on the Gini (ECCG) index theory was proposed in this paper. Specifically, a novel mechanism of Gini Index theory-based energy-efficient Cluster Head Election (GICHE) is presented based on the Gini Index and the expected energy distribution to achieve balanced energy consumption among different clusters. In addition, to improve inter-cluster energy efficiency, a Queue synchronous More >

  • Open Access

    ARTICLE

    An Improved Chicken Swarm Optimization Techniques Based on Cultural Algorithm Operators for Biometric Access Control

    Jonathan Ponmile Oguntoye1, Sunday Adeola Ajagbe2,3,*, Oluyinka Titilayo Adedeji1, Olufemi Olayanju Awodoye1, Abigail Bola Adetunji1, Elijah Olusayo Omidiora1, Matthew Olusegun Adigun2

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5713-5732, 2025, DOI:10.32604/cmc.2025.062440 - 30 July 2025

    Abstract This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization (CCSO) technique. This approach mitigates the limitations of conventional Chicken Swarm Optimization (CSO), especially in dealing with larger dimensions due to diversity loss during solution space exploration. Our experimentation involved 600 sample images encompassing facial, iris, and fingerprint data, collected from 200 students at Ladoke Akintola University of Technology (LAUTECH), Ogbomoso. The results demonstrate the remarkable effectiveness of CCSO, yielding accuracy rates of 90.42%, 91.67%, and 91.25% within 54.77, 27.35, and 113.92 s for facial, fingerprint, and iris biometrics,… More >

  • Open Access

    ARTICLE

    Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control

    Ammar Odeh*, Anas Abu Taleb

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 447-461, 2025, DOI:10.32604/cmc.2025.065426 - 09 June 2025

    Abstract The increasing deployment of Internet of Things (IoT) devices has introduced significant security challenges, including identity spoofing, unauthorized access, and data integrity breaches. Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure, scalability issues, and inefficiencies in real-time security enforcement. To address these limitations, this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security (BETAC-IoT) model, which integrates blockchain technology, smart contracts, federated learning, and Merkle tree-based integrity verification to enhance IoT security. The proposed model eliminates reliance on centralized authentication by employing decentralized identity management, ensuring tamper-proof… More >

  • Open Access

    ARTICLE

    Asynchronous Tiered Federated Learning Storage Scheme Based on Blockchain and IPFS

    Tianyu Li1, Dezhi Han1, Jiatao Li1, Kuan-Ching Li2,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4117-4140, 2025, DOI:10.32604/cmc.2025.063630 - 19 May 2025

    Abstract As is known, centralized federated learning faces risks of a single point of failure and privacy breaches, and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent works. However, malicious clients may still illegally access the blockchain to upload malicious data or steal on-chain data. In addition, blockchain-based federated training suffers from a heavy storage burden and excessive network communication overhead. To address these issues, we propose an asynchronous, tiered federated learning storage scheme based on blockchain and IPFS. It manages the execution of federated learning tasks through smart contracts… More >

  • Open Access

    ARTICLE

    Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data

    Shenjian Xiao1, Xiaoli Qin1, Yanzhao Tian1,*, Zhongkai Dang2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2351-2373, 2025, DOI:10.32604/cmc.2025.062324 - 16 April 2025

    Abstract The advent of the digital age has consistently provided impetus for facilitating global trade, as evidenced by the numerous customs clearance documents and participants involved in the international trade process, including enterprises, agents, and government departments. However, the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes. In addressing this need, this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption (MA-ABE) in combination with blockchain technology. This scheme supports proxy decryption, attribute revocation, and policy update,… More >

  • Open Access

    ARTICLE

    BIG-ABAC: Leveraging Big Data for Adaptive, Scalable, and Context-Aware Access Control

    Sondes Baccouri1,2,#,*, Takoua Abdellatif 3,#

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1071-1093, 2025, DOI:10.32604/cmes.2025.062902 - 11 April 2025

    Abstract Managing sensitive data in dynamic and high-stakes environments, such as healthcare, requires access control frameworks that offer real-time adaptability, scalability, and regulatory compliance. BIG-ABAC introduces a transformative approach to Attribute-Based Access Control (ABAC) by integrating real-time policy evaluation and contextual adaptation. Unlike traditional ABAC systems that rely on static policies, BIG-ABAC dynamically updates policies in response to evolving rules and real-time contextual attributes, ensuring precise and efficient access control. Leveraging decision trees evaluated in real-time, BIG-ABAC overcomes the limitations of conventional access control models, enabling seamless adaptation to complex, high-demand scenarios. The framework adheres to the… More >

  • Open Access

    ARTICLE

    Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

    Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025

    Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >

Displaying 1-10 on page 1 of 61. Per Page