Results 21 to 30 of about 400,277 (251)
Régimen Jurídico de la acción de acceso a la información pública en el Uruguay
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj +1 more source
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali +2 more
doaj +1 more source
Detecting Android Locker-Ransomware on Chinese Social Networks
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su +3 more
doaj +1 more source
Privacy Preserving Data Mining [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire +2 more sources
Practical Data-in-Use Protection Using Binary Decision Diagrams
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka +4 more
doaj +1 more source
Privacy-Preserving Data Mashup [PDF]
Data Mashup is a special class of mashup application that combines information on the fly from multiple data sources to respond to transient business needs. Mashing up data requires an important programming skill on the side of mashups' creators, and involves handling many challenging privacy and security concerns raised by data providers.
Barhamgi, Mahmoud +3 more
openaire +1 more source
While many of our daily practices have become intertwined with media and communication technologies, data privacy concerns are on the rise. Privacy is an essentially contested concept, contingent on context and perspective, which poses pragmatic problems in protecting it.
Ine Van Zeeland, Jo Pierson
+4 more sources
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies
Genome-wide association studies help uncover genetic influences on complex traits and diseases. Importantly, multi-site data collaborations enhance the statistical power of these studies but pose challenges due to the sensitivity of genomic data ...
Arjhun Swaminathan +4 more
doaj +1 more source
Background Various methods based on k-anonymity have been proposed for publishing medical data while preserving privacy. However, the k-anonymity property assumes that adversaries possess fixed background knowledge.
Hyukki Lee, Yon Dohn Chung
doaj +1 more source

