Results 241 to 250 of about 25,084,029 (287)
Some of the next articles are maybe not open access.

Designing Secure Data Warehouses

2006
Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data.
Rodolfo Villarroel   +3 more
openaire   +1 more source

Data Privacy and Security

2014
The concept of privacy is complex and it is common to think of privacy as interchangeable with security. In fact, this is not true and this chapter will introduce readers to the definition of privacy. The concept of personal health information (PHI) is explored in relation to collection, use, disclosure, and retention.
openaire   +2 more sources

Data security

Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire   +2 more sources

Data security

Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002
Elisa Bertino, FERRARI, ELENA
openaire   +2 more sources

Understanding the Chinese Data Security Law

International Cybersecurity Law Review, 2021
Jihong Chen, Jiabin Sun
semanticscholar   +1 more source

Data-Level Security

2016
Below the principal hierarchy, SQL Server provides a rich set of functionality for securing data. This chapter discusses the appropriate use of schemas, ownership chaining, impersonation, row-level security, and dynamic data masking.
openaire   +2 more sources

Research on Data Security in Big Data Cloud Computing Environment

IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2021
Fengling Wang, Han Wang, Liang Xue
semanticscholar   +1 more source

Data Mining and Homeland Security

2007
A significant amount of attention appears to be focusing on how to better collect, analyze, and disseminate information. In doing so, technology is commonly and increasingly looked upon as both a tool, and, in some cases, a substitute, for human resources.
openaire   +1 more source

Data Security

2017
Security is an area neglected by many CEOs and CIOs, sometimes becoming a career-ending issue. The cloud raises the most concerns, although reality is that in-house operations generally have weaker security. This chapter discusses the issues and the remedies to be applied.
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

Home - About - Disclaimer - Privacy