Search results for "data security"
showing 10 items of 32 documents
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Quality, Reliability, Security and Robustness in Heterogeneous Systems
2020
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Outsourcing information systems: A strategic partnership with risks
1993
Abstract As information processing and telecommunications technology increase in sophistication and complexity, organizations are finding it more difficult to manage their information systems (IS) for business success. Growing numbers are now sharing these responsibilities and risks with outsourcing vendors. American Standard, Eastman Kodak, General Dynamics, Metropolitan Life, and Young & Rubicam are prominent companies which have outsourced some or all of their IS activities. They are looking to gain competitive advantages by cutting costs and focusing internal resources on core activities. However, compromises in management control and data security, the potential of hidden costs, and th…
Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle
2017
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Giving patients secure " google-like " access to their medical record
2008
International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
Yksityisyys ja luottamus hakukoneiden käytössä
2016
Tämä tutkimus käsittelee yksityisyyden ja luottamuksen merkitystä hakukoneissa. Tämä on tärkeää, sillä hakukoneista on muodostunut ihmisten pääsääntöinen tiedon lähde. Näin ollen hakukoneiden yleistyminen on johtanut siihen, että käyttäjistä kerätään yhä enemmän henkilökohtaisia tietoja. Tämän ansiosta käyttäjille on noussut hakukoneista paljon yksityisyyshuolia ja sitä kautta myös luottamus voi rikkoutua. Tämä tutkimus on toteutettu kirjallisuuskatsauksena ja pyrkii vastaamaan tutkimuskysymykseen: mitä käyttäjän yksityisyys ja luottamus tarkoittavat hakukoneiden käytön yhteydessä? Tutkimuksen tulosten mukaan käyttäjien tietoisuuden parantamisella voidaan vaikuttaa sekä kokemukseen yksityis…
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…