Search results for "Data security"

showing 10 items of 32 documents

The Integration and Sharing of Resources for a New Quality of Living

2014

In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…

Computer sciencebusiness.industryEnergy (esotericism)Information technologyData securityEnergy consumptionEnvironmental economicsSettore ICAR/21 - Urbanisticacondivisione servizi e risorse aspetto giuridicoSmart gridSmart cityData Protection Act 1998sharing services and resources juridical aspectsSmart environmentbusiness
researchProduct

A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control

2006

Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…

National securityComputer access controlbusiness.industryComputer scienceMulti-agent systemAuthorizationData securityAccess controlComputer securitycomputer.software_genreCredentialMandatory access controlDiscretionary access controlRole-based access controlbusinesscomputer
researchProduct

Giving patients secure " google-like " access to their medical record

2008

International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …

patient identifier[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]watermarking[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]electronic signaturedirect accessdata securitymedical recordgridComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

The Politics of Privacy - a Useful Tautology

2020

While communication and media studies tend to define privacy with reference to data security, current processes of datafication and commodification substantially transform ways of how people act in increasingly dense communicative networks. This begs for advancing research on the flow of individual and organizational information considering its relational, contextual and, in consequence, political dimensions. Privacy, understood as the control over the flow of individual or group information in relation to communicative actions of others, frames the articles assembled in this thematic issue. These contributions focus on theoretical challenges of contemporary communication and media privacy …

Privatsphärepolitical factorspolitische FaktorenKommunikationsforschungagency; datafication; media practicesMedienkulturInternet privacymedia practicesData security050801 communication & media studiesMedia Politics Information Politics Media LawprivacyMedienpolitik Informationspolitik Medienrechtddc:070lcsh:Communication. Mass mediaPolitics0508 media and communications050602 political science & public administrationSociologydata securitydataficationNews media journalism publishingcommunication researchCommodificationDataficationbusiness.industryCommunication05 social sciencesTautology (grammar)data exchangelcsh:P87-960506 political scienceDatenaustauschagencymedia culturePublizistische Medien JournalismusVerlagswesenpoliticsbusinessDatensicherheit
researchProduct

Yksityisyys ja luottamus hakukoneiden käytössä

2016

Tämä tutkimus käsittelee yksityisyyden ja luottamuksen merkitystä hakukoneissa. Tämä on tärkeää, sillä hakukoneista on muodostunut ihmisten pääsääntöinen tiedon lähde. Näin ollen hakukoneiden yleistyminen on johtanut siihen, että käyttäjistä kerätään yhä enemmän henkilökohtaisia tietoja. Tämän ansiosta käyttäjille on noussut hakukoneista paljon yksityisyyshuolia ja sitä kautta myös luottamus voi rikkoutua. Tämä tutkimus on toteutettu kirjallisuuskatsauksena ja pyrkii vastaamaan tutkimuskysymykseen: mitä käyttäjän yksityisyys ja luottamus tarkoittavat hakukoneiden käytön yhteydessä? Tutkimuksen tulosten mukaan käyttäjien tietoisuuden parantamisella voidaan vaikuttaa sekä kokemukseen yksityis…

profilointitietosuojadata privacypersonalisation.luottamusyksityisyystrusttietoturvaHakuohjelmatprivacydata securitysearch engines
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct