Results 241 to 250 of about 3,264,256 (293)
Some of the next articles are maybe not open access.

Security for biometric data

SPIE Proceedings, 2004
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both privacy protection and user convenience. From a security point of view, biometric authentication offers the possibility to establish physical presence and unequivocal ...
Claus Vielhauer, Ton Kalker
openaire   +1 more source

Secure data storage

2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014
Secure storage of data and the current availability of data and information are the most important aspects of any ICT (Information and Communications Technology) system. Data storage systems are mandatory components of modern information systems. The term backup refers to creating a backup or copy of data with the aim of restoring the data in case the ...
Panco Ristov, Ante Mrvica, Toni Miskovic
openaire   +1 more source

Data security

Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire   +1 more source

Differentiating Data Security and Network Security

2008 IEEE International Conference on Communications, 2008
Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "break" the generated cipher code. It has been demonstrated that this inability is temporary because some strong cryptographic methods that were believed to be unbreakable have been broken.
openaire   +1 more source

A Security Architecture for Data Privacy and Security

2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture
openaire   +1 more source

Privacy and Data Security

Computer, 2012
The third in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets focuses on the responsibility to ensure privacy and data security. The featured Web extra is an audio podcast by Brian M. Gaff and Thomas J. Smedinghoff, two of the article's coauthors.
Brian M. Gaff   +2 more
openaire   +1 more source

Security at the data level

Network Security, 2013
It is not a matter of whether organisations will be hacked and their defences breached, but when. Responsible Chief Information Security Officers (CISOs) should assume the perimeter is permeable and security efforts need to trickle right down to protecting individual data on the network.
openaire   +1 more source

Security of Backup Data

Information Systems Security, 2006
Abstract If your company is like many others, you have put a lot of effort into securing your information systems. You've implemented technology and procedures at great expense, but you may be omitting an important last step: secure off-site storage.
openaire   +1 more source

Security and Data Mining

1996
Database mining can be defined as the process of mining for implicit, previously unknown, and potentially useful information from very large databases by efficient knowledge discovery techniques. Naturally such a process may open up new inference channels, detect new intrusion patterns, and raises new security problems.
Tsau Young Lin   +3 more
openaire   +1 more source

Data Provenance and Security

IEEE Security & Privacy Magazine, 2011
An unanticipated consequence of the Internet age is a pervasive loss of context. Users and organizations receive information in incredible volumes from both internal processes and far-flung, untrusted, and sometimes unknown sources.
openaire   +1 more source

Home - About - Disclaimer - Privacy