Results 1 to 10 of about 22,394,325 (191)

Securing Data with Workgroup Security [PDF]

open access: possible, 2004
Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire   +1 more source
Some of the next articles are maybe not open access.

Secure Data Dissemination

2004
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after provided an overview of the work carried out in this field, we have focused on the security properties that a secure SDI system (SSDI system) must satisfy and on some of the strategies and mechanisms that can be
Bertino E.   +2 more
openaire   +2 more sources

Data Security

Designing Big Data Platforms, 2021
As stewards of Duke’s resources, we are expected to exercise sound judgment using data prudently and ethically. Additionally, various federal and state laws impose obligations on Duke, including, but not limited to HIPAA [2], FERPA [3], FISMA, the NC ...

semanticscholar   +1 more source

Data Security

IEEE Transactions on Consumer Electronics, 1981
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire   +2 more sources

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?

IEEE Cloud Computing, 2018
One particular trend observed in healthcare is the progressive shift of data and services to the cloud, partly due to convenience (e.g. availability of complete patient medical history in real-time) and savings (e.g.
C. Esposito   +4 more
semanticscholar   +1 more source

On Securely Manipulating XML Data

2013
Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A small number of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of the update operations of W3C ...
Mahfoud, Houari, Imine, Abdessamad
openaire   +8 more sources

Cloud security ecosystem for data security and privacy

Confluence, 2020
In the past couple of years Cloud Computing has become an eminent part of the IT industry. As a result of its economic benefits more and more people are heading towards Cloud adoption.
Akshay Arora   +3 more
semanticscholar   +1 more source

Data security and consumer trust in FinTech innovation in Germany

Information and Computer Security, 2018
The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of mobile devices and their usage have increased the uptake of financial technology
H. Stewart, J. Jürjens
semanticscholar   +1 more source

Differentiating Data Security and Network Security

2008 IEEE International Conference on Communications, 2008
Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "break" the generated cipher code. It has been demonstrated that this inability is temporary because some strong cryptographic methods that were believed to be unbreakable have been broken.
openaire   +2 more sources

3D Fluorescent Hydrogel Origami for Multistage Data Security Protection

Advanced Functional Materials, 2019
Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy