Search results for "Data security"

showing 10 items of 32 documents

epiPATH: an information system for the storage and management of molecular epidemiology data from infectious pathogens.

2007

Abstract Background Most research scientists working in the fields of molecular epidemiology, population and evolutionary genetics are confronted with the management of large volumes of data. Moreover, the data used in studies of infectious diseases are complex and usually derive from different institutions such as hospitals or laboratories. Since no public database scheme incorporating clinical and epidemiological information about patients and molecular information about pathogens is currently available, we have developed an information system, composed by a main database and a web-based interface, which integrates both types of data and satisfies requirements of good organization, simple…

Interface (computing)PopulationData securityBiologycomputer.software_genreBioinformaticsWork relatedCommunicable Diseaseslcsh:Infectious and parasitic diseasesRelational database management systemDatabases GeneticInformation systemHumanslcsh:RC109-216RegistrieseducationDatabase servereducation.field_of_studyInternetMolecular EpidemiologyDatabase schemaData scienceInfectious DiseasesDatabase Management SystemscomputerSoftwareBMC infectious diseases
researchProduct

Lua Code: Security Overview and Practical Approaches to Static Analysis

2017

Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…

JavaComputer sciencevulnerabilityStatic program analysis02 engineering and technologyLuaJavaScriptSecurity testingohjelmointikielet020204 information systemsprogramming languages0202 electrical engineering electronic engineering information engineeringWeb applicationtietoturvadata securityhaavoittuvuuscomputer.programming_languageCodebaseta113business.industryComputingMilieux_PERSONALCOMPUTING020207 software engineeringPython (programming language)Static analysisAbstract syntax treeSoftware engineeringbusinesscomputer
researchProduct

Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity

2017

Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…

Multi-modal data collectionEngineeringNutrition and DiseasePopulationPrivacy laws of the United StatesData securityWearable computer050109 social psychology02 engineering and technologycomputer.software_genreActivity recognitionBeverage consumption logging020204 information systemsVoeding en Ziekte0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesAccelerometer dataeducationSensory Science and Eating BehaviourVLAGConsumption (economics)education.field_of_studyMultimediabusiness.industryBarcode scanning05 social sciencesLocale (computer hardware)PresentationData scienceSensoriek en eetgedragActivity recognitionbusinesscomputer
researchProduct

A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control

2006

Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…

National securityComputer access controlbusiness.industryComputer scienceMulti-agent systemAuthorizationData securityAccess controlComputer securitycomputer.software_genreCredentialMandatory access controlDiscretionary access controlRole-based access controlbusinesscomputer
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

The Politics of Privacy - a Useful Tautology

2020

While communication and media studies tend to define privacy with reference to data security, current processes of datafication and commodification substantially transform ways of how people act in increasingly dense communicative networks. This begs for advancing research on the flow of individual and organizational information considering its relational, contextual and, in consequence, political dimensions. Privacy, understood as the control over the flow of individual or group information in relation to communicative actions of others, frames the articles assembled in this thematic issue. These contributions focus on theoretical challenges of contemporary communication and media privacy …

Privatsphärepolitical factorspolitische FaktorenKommunikationsforschungagency; datafication; media practicesMedienkulturInternet privacymedia practicesData security050801 communication & media studiesMedia Politics Information Politics Media LawprivacyMedienpolitik Informationspolitik Medienrechtddc:070lcsh:Communication. Mass mediaPolitics0508 media and communications050602 political science & public administrationSociologydata securitydataficationNews media journalism publishingcommunication researchCommodificationDataficationbusiness.industryCommunication05 social sciencesTautology (grammar)data exchangelcsh:P87-960506 political scienceDatenaustauschagencymedia culturePublizistische Medien JournalismusVerlagswesenpoliticsbusinessDatensicherheit
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Secure e-voting in smart communities

2020

Nowadays, digital voting systems are growing in importance. This is an especially sensitive area, because elections can directly affect democratic life of many smart communities. The goal of digital voting systems is to exploit ICT technologies to improve the security and usability of traditional electoral systems. In this work we present a secure electronic voting system that guarantees the secrecy, anonymity, integrity, uniqueness and authenticity of votes, while offering a user-friendly experience to voters, putting them at ease through the use of technologies familiar to them. To ensure these fundamental security requirements, the system fully separates the registration and voting phase…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniData Securitye-VotingSmart Communitie
researchProduct

Implementing cloud ERP solutions: a review of sociotechnical concerns

2018

Abstract Cloud ERP solutions allow organizations of all sizes to support and coordinate key business processes by leveraging virtualization. Nevertheless, the implementation of cloud ERPs is not straightforward and there are significant issues that need to be taken into account when launching cloud ERP initiatives. To explore these issues, we conducted an in-depth systematic review of related research literature. We identified six key issues related to cloud ERP implementation: a) functionality fit, b) integration, c) data migration, d) organizational change, e) data security, and f) reliability. Furthermore, we mapped these issues to the different sizes of organizations. Based on this revi…

Sociotechnical systemProcess managementBusiness processbusiness.industryComputer science05 social sciencesData securityCloud computing02 engineering and technologyVirtualizationcomputer.software_genreEmpirical research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary Sciencesbusinesscomputer050203 business & managementData migrationGeneral Environmental ScienceProcedia Computer Science
researchProduct

Evaluation of a hash-compress-encrypt pipeline for storage system applications

2015

Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.

UnixDatabaseComputer sciencebusiness.industryHash functionData securityCryptographycomputer.software_genreEncryptionPipeline (software)Pipeline transportEmbedded systemComputer data storagebusinesscomputer2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
researchProduct