Scheduling algorithms for data-protection based on security-classification constraints to data-dissemination.
Mohammad Mahmood OtoomMahdi JemmaliWael M. KhedrAkram Y. SarhanImen AchourIbrahim AlsaduniAbdullah BajahzarMohamed Nazih OmriPublished in: PeerJ Comput. Sci. (2023)
Keyphrases
- data dissemination
- data protection
- scheduling algorithm
- data broadcast
- access control
- information security
- response time
- sensor networks
- information dissemination
- data security
- wireless sensor networks
- data integrity
- energy efficient
- intrusion detection
- data retrieval
- privacy protection
- sensitive information
- mobile computing
- data management
- data sets