Results 241 to 250 of about 3,206,915 (290)
Some of the next articles are maybe not open access.

ANALYSIS OF METHODS DATA SECURITY

Information systems and technologies security, 2020
The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and ...
Vira Ignisca, Danylo Vdovenko
openaire   +1 more source

Internet of Things, Security of Data, and Cyber Security

2022
Diverse forms of cyber security techniques are at the forefront of triggering digital security innovations, whereas cybersecurity has become one of the key areas of the internet of things (IoT). The IoT cybersecurity mitigates cybersecurity risk for organizations and users through tools such as blockchain, intelligent logistics, and smart home ...
openaire   +1 more source

Research on Data Security of Public Security Big Data Platform

2017
The big data service platform of public security information brings together all kinds of data resources related to public safety, and provides an effective data base for big data application analysis system. However, centralized data resources presents a huge challenge to data security protection services.
openaire   +1 more source

Weak disclosure of secure data

Information Sciences, 1996
Abstract A concept, called weak disclosure, is defined from an intruder's standpoint. Using this concept and a set of prior information related to the confidential attribute, an intruder can estimate the value of a confidential attribute more accurately than the response from the database.
Y.S. Pan, Y.H. Chin
openaire   +1 more source

Natural defences [security of data]

Engineering & Technology, 2006
Researchers are harnessing biologically inspired defence strategies in the unending battle against computer viruses and malware. Various ideas are being applied to remove morphing information-stealing programmes. The software product Primary Response SafeConnect, detects malicious programmes by the actions they take, and removes them using a simple ...
openaire   +1 more source

Practical Aspects of Handling Data Protection and Data Security

1991
Looking at practical applications of health care information systems, we must conclude that in the field of data protection there still is too large a gap between what is feasible and necessary on one hand, and what is achieved in actual realizations on the other.
openaire   +2 more sources

Secure cloud storage of data

2014 International Conference on Computer Communication and Informatics, 2014
Cloud computing is one of the upcoming technologies that will upgrade generation of Internet. The data stored in the smart phones is increased as more applications are deployed and executed. If the phone is damaged or lost then the information stored in it gets lost.
Kirti A. Dongre   +2 more
openaire   +1 more source

Data security of Android applications

2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016
Smartphones have become ubiquitous in our society. With a large number of users spending more time and sharing more personal data with these devices, it would be beneficial to gain some understanding of data security. This paper presents different security issues regarding applications of Android systems which are one of the most popular mobile ...
Jesse Obiri-Yeboah, Man Qi
openaire   +1 more source

Secure management of health data

EU Research
Healthcare registries hold vast amounts of data on the population, and while this data is enormously valuable to medical researchers, it must also be managed in a secure way. Researchers in the SmartMed project are using smart contracts and blockchain technology to provide effective solutions to this challenge, as Roman Vitenberg, Jan Nygård and Dusica
Jan Nygård   +2 more
openaire   +1 more source

Enhancement of secure data transmission

Proceedings of the 2007 Euro American conference on Telematics and information systems, 2007
The growth of high-speed networks has explored means of new business, science, entertainment and social opportunities. This has been achieved through client-server technology. Compression and encryption places a vital role in client-server technology.
openaire   +1 more source

Home - About - Disclaimer - Privacy