scispace - formally typeset
N

Noora Fetais

Researcher at Qatar University

Publications -  42
Citations -  438

Noora Fetais is an academic researcher from Qatar University. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 7, co-authored 36 publications receiving 159 citations.

Papers
More filters
Proceedings ArticleDOI

Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity

TL;DR: This work proposes BiiMED: a Blockchain framework for Enhancing Data Interoperability and Integrity regarding EHR-sharing, which includes an access management system allowing the exchange of EHRs between different medical providers and a decentralized Trusted Third Party Auditor for ensuring data integrity.
Journal ArticleDOI

Systematic identification of threats in the cloud: A Survey

TL;DR: This survey explores threats to the cloud by investigating the linkages between threats, attacks and vulnerabilities, and proposes a method to identify threats systematically in the cloud using the threat classifications.
Journal ArticleDOI

Blockchain for the Internet of Vehicles: How to Use Blockchain to Secure Vehicle-to-Everything (V2X) Communication and Payment?

TL;DR: This work proposes a Blockchain-based solution for establishing secure payment and communication (PSEV) in order to study the use of Blockchain as middle-ware between different participants of intelligent transportation systems.
Journal ArticleDOI

Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review

TL;DR: The state of the art of Blockchain-based IoV solutions (BIoV) is explored by referring to a large and trusted source database from the Scopus data bank and the reviewed literature is classified according to the research direction and implemented IoV layer.
Journal ArticleDOI

Threat-Specific Security Risk Evaluation in the Cloud

TL;DR: A threat-specific risk evaluation approach that uses various security attributes of the cloud as well as the client-specific security requirements in the cloud to enable security administrators to compute a range of more effective client- specific countermeasures with respect to the importance of security requirements and threats.