Results 241 to 250 of about 25,084,029 (287)
Some of the next articles are maybe not open access.
Designing Secure Data Warehouses
2006Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data.
Rodolfo Villarroel+3 more
openaire +1 more source
2014
The concept of privacy is complex and it is common to think of privacy as interchangeable with security. In fact, this is not true and this chapter will introduce readers to the definition of privacy. The concept of personal health information (PHI) is explored in relation to collection, use, disclosure, and retention.
openaire +2 more sources
The concept of privacy is complex and it is common to think of privacy as interchangeable with security. In fact, this is not true and this chapter will introduce readers to the definition of privacy. The concept of personal health information (PHI) is explored in relation to collection, use, disclosure, and retention.
openaire +2 more sources
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +2 more sources
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +2 more sources
Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002
Elisa Bertino, FERRARI, ELENA
openaire +2 more sources
Elisa Bertino, FERRARI, ELENA
openaire +2 more sources
Understanding the Chinese Data Security Law
International Cybersecurity Law Review, 2021Jihong Chen, Jiabin Sun
semanticscholar +1 more source
2016
Below the principal hierarchy, SQL Server provides a rich set of functionality for securing data. This chapter discusses the appropriate use of schemas, ownership chaining, impersonation, row-level security, and dynamic data masking.
openaire +2 more sources
Below the principal hierarchy, SQL Server provides a rich set of functionality for securing data. This chapter discusses the appropriate use of schemas, ownership chaining, impersonation, row-level security, and dynamic data masking.
openaire +2 more sources
Research on Data Security in Big Data Cloud Computing Environment
IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2021Fengling Wang, Han Wang, Liang Xue
semanticscholar +1 more source
Data Mining and Homeland Security
2007A significant amount of attention appears to be focusing on how to better collect, analyze, and disseminate information. In doing so, technology is commonly and increasingly looked upon as both a tool, and, in some cases, a substitute, for human resources.
openaire +1 more source
2017
Security is an area neglected by many CEOs and CIOs, sometimes becoming a career-ending issue. The cloud raises the most concerns, although reality is that in-house operations generally have weaker security. This chapter discusses the issues and the remedies to be applied.
openaire +2 more sources
Security is an area neglected by many CEOs and CIOs, sometimes becoming a career-ending issue. The cloud raises the most concerns, although reality is that in-house operations generally have weaker security. This chapter discusses the issues and the remedies to be applied.
openaire +2 more sources
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly