Results 241 to 250 of about 3,206,915 (290)
Some of the next articles are maybe not open access.
ANALYSIS OF METHODS DATA SECURITY
Information systems and technologies security, 2020The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and ...
Vira Ignisca, Danylo Vdovenko
openaire +1 more source
Internet of Things, Security of Data, and Cyber Security
2022Diverse forms of cyber security techniques are at the forefront of triggering digital security innovations, whereas cybersecurity has become one of the key areas of the internet of things (IoT). The IoT cybersecurity mitigates cybersecurity risk for organizations and users through tools such as blockchain, intelligent logistics, and smart home ...
openaire +1 more source
Research on Data Security of Public Security Big Data Platform
2017The big data service platform of public security information brings together all kinds of data resources related to public safety, and provides an effective data base for big data application analysis system. However, centralized data resources presents a huge challenge to data security protection services.
openaire +1 more source
Weak disclosure of secure data
Information Sciences, 1996Abstract A concept, called weak disclosure, is defined from an intruder's standpoint. Using this concept and a set of prior information related to the confidential attribute, an intruder can estimate the value of a confidential attribute more accurately than the response from the database.
Y.S. Pan, Y.H. Chin
openaire +1 more source
Natural defences [security of data]
Engineering & Technology, 2006Researchers are harnessing biologically inspired defence strategies in the unending battle against computer viruses and malware. Various ideas are being applied to remove morphing information-stealing programmes. The software product Primary Response SafeConnect, detects malicious programmes by the actions they take, and removes them using a simple ...
openaire +1 more source
Practical Aspects of Handling Data Protection and Data Security
1991Looking at practical applications of health care information systems, we must conclude that in the field of data protection there still is too large a gap between what is feasible and necessary on one hand, and what is achieved in actual realizations on the other.
openaire +2 more sources
2014 International Conference on Computer Communication and Informatics, 2014
Cloud computing is one of the upcoming technologies that will upgrade generation of Internet. The data stored in the smart phones is increased as more applications are deployed and executed. If the phone is damaged or lost then the information stored in it gets lost.
Kirti A. Dongre +2 more
openaire +1 more source
Cloud computing is one of the upcoming technologies that will upgrade generation of Internet. The data stored in the smart phones is increased as more applications are deployed and executed. If the phone is damaged or lost then the information stored in it gets lost.
Kirti A. Dongre +2 more
openaire +1 more source
Data security of Android applications
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016Smartphones have become ubiquitous in our society. With a large number of users spending more time and sharing more personal data with these devices, it would be beneficial to gain some understanding of data security. This paper presents different security issues regarding applications of Android systems which are one of the most popular mobile ...
Jesse Obiri-Yeboah, Man Qi
openaire +1 more source
Secure management of health data
EU ResearchHealthcare registries hold vast amounts of data on the population, and while this data is enormously valuable to medical researchers, it must also be managed in a secure way. Researchers in the SmartMed project are using smart contracts and blockchain technology to provide effective solutions to this challenge, as Roman Vitenberg, Jan Nygård and Dusica
Jan Nygård +2 more
openaire +1 more source
Enhancement of secure data transmission
Proceedings of the 2007 Euro American conference on Telematics and information systems, 2007The growth of high-speed networks has explored means of new business, science, entertainment and social opportunities. This has been achieved through client-server technology. Compression and encryption places a vital role in client-server technology.
openaire +1 more source

