Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry"
In above article <xref ref-type="bibr" rid="ref1">[1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as <xref ref-type="bibr" rid="ref2">[2] . Therefore, the se...
Saved in:
Published in | IEEE access Vol. 9; p. 79628 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In above article <xref ref-type="bibr" rid="ref1">[1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as <xref ref-type="bibr" rid="ref2">[2] . Therefore, the sentences in the article <xref ref-type="bibr" rid="ref1">[1] with reference [11] should be cited <xref ref-type="bibr" rid="ref2">[2] in this article as "When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds <xref ref-type="bibr" rid="ref2">[2] ," "Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing <xref ref-type="bibr" rid="ref2">[2] and <xref ref-type="bibr" rid="ref3">[3] ," and "However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted <xref ref-type="bibr" rid="ref2">[2] ." |
---|---|
AbstractList | In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2] . Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as “When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2] ,” “Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3] ,” and “However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2] .” In above article <xref ref-type="bibr" rid="ref1">[1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as <xref ref-type="bibr" rid="ref2">[2] . Therefore, the sentences in the article <xref ref-type="bibr" rid="ref1">[1] with reference [11] should be cited <xref ref-type="bibr" rid="ref2">[2] in this article as "When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds <xref ref-type="bibr" rid="ref2">[2] ," "Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing <xref ref-type="bibr" rid="ref2">[2] and <xref ref-type="bibr" rid="ref3">[3] ," and "However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted <xref ref-type="bibr" rid="ref2">[2] ." |
Author | Abrar, Hina Saleem, Kashif Orgun, Mehmet A. Valli, Craig Al-Muhtadi, Jalal Hussain, Syed Jawad Chaudhry, Junaid |
Author_xml | – sequence: 1 givenname: Hina orcidid: 0000-0002-7617-6120 surname: Abrar fullname: Abrar, Hina organization: Department of Computer Science and Engineering, HITEC University, Taxila, Pakistan – sequence: 2 givenname: Syed Jawad surname: Hussain fullname: Hussain, Syed Jawad organization: Department of Computer Science and Information Technology, The University of Lahore, Lahore, Pakistan – sequence: 3 givenname: Junaid orcidid: 0000-0003-2000-7915 surname: Chaudhry fullname: Chaudhry, Junaid organization: College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, AZ, USA – sequence: 4 givenname: Kashif orcidid: 0000-0001-8062-3301 surname: Saleem fullname: Saleem, Kashif email: ksaleem@ksu.edu.sa organization: Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia – sequence: 5 givenname: Mehmet A. orcidid: 0000-0002-7873-1562 surname: Orgun fullname: Orgun, Mehmet A. organization: Department of Computing, Macquarie University, Sydney, NSW, Australia – sequence: 6 givenname: Jalal orcidid: 0000-0003-0246-2148 surname: Al-Muhtadi fullname: Al-Muhtadi, Jalal organization: Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia – sequence: 7 givenname: Craig surname: Valli fullname: Valli, Craig organization: Security Research Institute, Edith Cowan University, Joondalup, WA, Australia |
BookMark | eNpNUctOwzAQtBBIQOELuFhwbvE7zrGKgFaqBKJw4GQ5foBLiIudHPr3BFJV7GVXo51Z7cw5OG5j6wC4wmiGMSpv51V1t17PCCJ4RpFkqOBH4IxgUU4pp-L433wKLnPeoKHkAPHiDLxVMSVnuhDbDLsIr59D_oTzVje7HDKMHlZN7C1cxz6Z0L7D0MKF0033YXRyULcWPvV1E8wehcvW9rlLu-sLcOJ1k93lvk_A6_3dS7WYrh4fltV8NTUEUT4V1gle4LowWBrhObOGUeaRsaI2VBBmGSfI1sJSLighBDGrXV2UREjDC08nYDnq2qg3apvCl047FXVQf0BM70qnLpjGKVQTp23tNbeYEY9KQr2VRCLsJfWlHrRuRq1tit-9y53aDH8PZmRFOC0HC3nJhi06bpkUc07OH65ipH4jUWMk6jcStY9kYF2NrOCcOzBKxgrJJP0BjnyH4Q |
CODEN | IAECCG |
Cites_doi | 10.1007/978-3-030-23943-5_6 10.1109/ACCESS.2018.2805919 10.3390/fi4020469 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2021.3084075 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals - May need to register for free articles |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 79628 |
ExternalDocumentID | oai_doaj_org_article_0b2eadbfa5d142f0923fd82801f83f9a 10_1109_ACCESS_2021_3084075 9447848 |
Genre | errata Correction/Retraction |
GrantInformation_xml | – fundername: Deanship of Scientific Research at King Saud University through the Research Group grantid: RG-1439-022 funderid: 10.13039/501100011665 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2035-6de6571b7c18c6f54dc434f0cd6bc3624d4520db6d356322204daeb79268c57f3 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:23:22 EDT 2025 Mon Jun 30 06:49:49 EDT 2025 Tue Jul 01 04:03:36 EDT 2025 Wed Aug 27 02:40:05 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2035-6de6571b7c18c6f54dc434f0cd6bc3624d4520db6d356322204daeb79268c57f3 |
Notes | ObjectType-Correction/Retraction-1 SourceType-Scholarly Journals-1 content type line 14 |
ORCID | 0000-0001-8062-3301 0000-0002-7873-1562 0000-0003-2000-7915 0000-0003-0246-2148 0000-0002-7617-6120 |
OpenAccessLink | https://doaj.org/article/0b2eadbfa5d142f0923fd82801f83f9a |
PQID | 2539353594 |
PQPubID | 4845423 |
PageCount | 1 |
ParticipantIDs | ieee_primary_9447848 doaj_primary_oai_doaj_org_article_0b2eadbfa5d142f0923fd82801f83f9a proquest_journals_2539353594 crossref_primary_10_1109_ACCESS_2021_3084075 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210000 2021-00-00 20210101 2021-01-01 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – year: 2021 text: 20210000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref3 ref2 ref1 |
References_xml | – ident: ref2 doi: 10.1007/978-3-030-23943-5_6 – ident: ref1 doi: 10.1109/ACCESS.2018.2805919 – ident: ref3 doi: 10.3390/fi4020469 |
SSID | ssj0000816957 |
Score | 2.1919708 |
Snippet | In above article <xref ref-type="bibr" rid="ref1">[1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The... In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Index Database Publisher |
StartPage | 79628 |
SubjectTerms | Cloud computing Encryption Industries Maintenance engineering Organizations Risk analysis Safety |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB7BnuBACxSxLUUW4sguTmI79pFGXa0qbQ8tSPRkxS8JgRLU3T2UX8848UaIcuAWWXHk5BtnHp75BuCcS1obNL0nxgR0UAyKseTSx0wAZoNUqHRjcfLip5jfsB-3_HYLLoZaGO99l3zmp_GyO8t3rV3HUNmlYqyUTG7DNjpufa3WEE-JDSQULxOxUEbV5VVV4TugC5hn04KiIxNzCV8on46jPzVV-e9P3KmX2QdYbBbWZ5XcT9crM7VPrzgb37vyj7CX7Exy1QvGPmz55gB2X7APHsKfKnbm6OoalmTVkrNfd8t7smEpIW0g1UO7duR3jO_jDHLXkPmQLkbqxpE-6JdGSWoD8u_sE9zMvl9X80nqtDCxeeSsFM4LXmamtJm0InDmLCtYoNYJY1HFMcd4Tp0RruAins1Q5mpvSpULaXkZiiMYNW3jj4GgySG8LzyadpaFghpquAxoZzjFuONyDBcbCPRjT6ihO0eEKt0jpiNiOiE2hm8RpuHWyIbdDeDn1WlzaWpy3BAm1NxlLA8Ujdbg0JWkWZBFUPUYDiMkw0MSGmM42YCu085d6pzHYuWCK_b57VlfYCcusA_DnMBo9Xftv6JhsjKnnUQ-A0Bg3uQ priority: 102 providerName: IEEE |
Title | Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry" |
URI | https://ieeexplore.ieee.org/document/9447848 https://www.proquest.com/docview/2539353594 https://doaj.org/article/0b2eadbfa5d142f0923fd82801f83f9a |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA7iSQ-iVrE-SigerWZ3k2xyrIulCHpQC3oKmxeIsiu2Hvz3TrJpKXjw4jXsI5nJZr6ZnfkGoXMmSK0Beo-09uCgaNjGggkXMgGo8UKC0Q3FyXf3fDqjt8_sea3VV8gJ6-iBO8FdEZ3DYrWvmc1o7gkAEm_BTSCZF4WXERqBzVtzpuIZLDIuWZlohjIir8ZVBSsChzDPLgsCbk3ILFwzRZGxP7VY-XUuR2Mz2UU7CSXicTe7PbThmn20vcYd2EMvVeirEasS5njR4uHD6_wNLzlGcOtx9d5-WfwYovNwB35t8HSV7IXrxuIuZJdGcWri8T08QLPJzVM1HaU-CSOTB8ZJbh1nZaZLkwnDPaPW0IJ6YizXBgwUtZTlxGpuC8bDnxVCbe10KXMuDCt9cYg2m7ZxRwgDYODOFQ6AmaG-IJpoJjygBCsps0z00cVSZOqjo8NQ0Y0gUnUSVkHCKkm4j66DWFeXBi7rOAAaVknD6i8N91EvKGX1EElpKShM5XSpJJW-u7nKWSg1Lpikx__x6hO0FZbThVxO0ebi88udAQhZ6EHcb4NYL_gDsRrXCA |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Lb9QwEB6VcgAOvApiaQGrghu7dRw7sQ89lEC1pY8DtFI5mfglVUUJYneF2t_CX-G_dZx4owq4VuIWWbGVeD7b34znAfBaSFobpN5jYwIqKAZhLIX00ROA2yAVHroxOPnwqJie8I-n4nQFfg2xMN77zvnMT-Jjd5fvWruIprItxXkpuUwulPv-4icqaLPtvfcozTeM7X44rqbjVENgbFnMxlg4X4gyM6XNpC2C4M7ynAdqXWEsbt7cccGoM4XLRRFvHSh3tTelYoW0ogw5jnsLbiPPEKyPDhssOLFkhRJlSmWUUbW1U1U4a6h0smySU1SdovfiteOuqwqQyrj8tfd3B9ruA_i9nIrej-V8spibib38I0vk_zpXD-F-YtJkp4f-I1jxzWO4dy2_4hp8qWLtkS5yY0bmLdn8dDY7J8s8LKQNpPrWLhz5HG8wsAc5a8h0cIgjdeNIb9ZMrSQVOrnYfAInN_JvT2G1aRv_DAiSqsL73CN5tTzk1FAjZEAm5RQXTsgRvF2KXH_vU4boTtWiSvcI0REhOiFkBO8iLIZXY77vrgHFqdP2oalhuORNqIXLOAsUaXlwqCzTLMg8qHoEaxECwyBJ-iPYWIJMp71pppmI4di5UPz5v3u9gjvT48MDfbB3tL8Od-PH9kanDVid_1j4F0jD5uZltxoIfL1pSF0Bqao6tg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Corrections+to+%22Risk+Analysis+of+Cloud+Sourcing+in+Healthcare+and+Public+Health+Industry%22&rft.jtitle=IEEE+access&rft.au=Abrar%2C+Hina&rft.au=Hussain%2C+Syed+Jawad&rft.au=Chaudhry%2C+Junaid&rft.au=Saleem%2C+Kashif&rft.date=2021&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=9&rft.spage=79628&rft.epage=79628&rft_id=info:doi/10.1109%2FACCESS.2021.3084075&rft.externalDocID=9447848 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |