A great success of Wireless Sensor Networks (WSNs). Recent advances in Wireless Sensor Network technologies provide people the ability to better understand the physical world. With the data collected from the entire network, the sensor network supports a variety of applications, including security surveillance, localization, information enquiry, and transmission. The ubiquitous data collection by mobile […]
Using Dependency Structures for Prioritisation of Functional Test Suites
Test case prioritisation is the process of ordering the execution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Increasing the rate of fault detection can provide earlier feedback to system developers, improving fault fixing activity and ultimately software delivery. Many existing test case prioritisation techniques consider that […]
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access […]
Improving Security and Efficiency in Attribute-Based Data Sharing
One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Ciphertext policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. However, the advantage comes with a major drawback which is known as a key escrow problem. The key generation […]