Results 1 to 10 of about 22,394,325 (191)
Securing Data with Workgroup Security [PDF]
Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire +1 more source
Some of the next articles are maybe not open access.
2004
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after provided an overview of the work carried out in this field, we have focused on the security properties that a secure SDI system (SSDI system) must satisfy and on some of the strategies and mechanisms that can be
Bertino E.+2 more
openaire +2 more sources
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after provided an overview of the work carried out in this field, we have focused on the security properties that a secure SDI system (SSDI system) must satisfy and on some of the strategies and mechanisms that can be
Bertino E.+2 more
openaire +2 more sources
Designing Big Data Platforms, 2021
As stewards of Duke’s resources, we are expected to exercise sound judgment using data prudently and ethically. Additionally, various federal and state laws impose obligations on Duke, including, but not limited to HIPAA [2], FERPA [3], FISMA, the NC ...
semanticscholar +1 more source
As stewards of Duke’s resources, we are expected to exercise sound judgment using data prudently and ethically. Additionally, various federal and state laws impose obligations on Duke, including, but not limited to HIPAA [2], FERPA [3], FISMA, the NC ...
semanticscholar +1 more source
IEEE Transactions on Consumer Electronics, 1981
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire +2 more sources
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire +2 more sources
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Computing, 2018One particular trend observed in healthcare is the progressive shift of data and services to the cloud, partly due to convenience (e.g. availability of complete patient medical history in real-time) and savings (e.g.
C. Esposito+4 more
semanticscholar +1 more source
On Securely Manipulating XML Data
2013Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A small number of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of the update operations of W3C ...
Mahfoud, Houari, Imine, Abdessamad
openaire +8 more sources
Cloud security ecosystem for data security and privacy
Confluence, 2020In the past couple of years Cloud Computing has become an eminent part of the IT industry. As a result of its economic benefits more and more people are heading towards Cloud adoption.
Akshay Arora+3 more
semanticscholar +1 more source
Data security and consumer trust in FinTech innovation in Germany
Information and Computer Security, 2018The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of mobile devices and their usage have increased the uptake of financial technology
H. Stewart, J. Jürjens
semanticscholar +1 more source
Differentiating Data Security and Network Security
2008 IEEE International Conference on Communications, 2008Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "break" the generated cipher code. It has been demonstrated that this inability is temporary because some strong cryptographic methods that were believed to be unbreakable have been broken.
openaire +2 more sources
3D Fluorescent Hydrogel Origami for Multistage Data Security Protection
Advanced Functional Materials, 2019Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang+5 more
semanticscholar +1 more source