Search results for "data security"

showing 10 items of 32 documents

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

Quality, Reliability, Security and Robustness in Heterogeneous Systems

2020

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.

bandwidthartificial intelligenceinternetmobiledevicesrouterstelecommunication networksdata communication systemscomputing mobileWorld Wide Webroutingsensorcomputer networkstelecommunication trafficdata securitysignal processingwireless sensor networksnetworks sensorswireless telecommunication systems
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Outsourcing information systems: A strategic partnership with risks

1993

Abstract As information processing and telecommunications technology increase in sophistication and complexity, organizations are finding it more difficult to manage their information systems (IS) for business success. Growing numbers are now sharing these responsibilities and risks with outsourcing vendors. American Standard, Eastman Kodak, General Dynamics, Metropolitan Life, and Young & Rubicam are prominent companies which have outsourced some or all of their IS activities. They are looking to gain competitive advantages by cutting costs and focusing internal resources on core activities. However, compromises in management control and data security, the potential of hidden costs, and th…

business.industryStrategy and Managementmedia_common.quotation_subjectGeography Planning and DevelopmentInformation processingData securityCompetitive advantageKnowledge process outsourcingOutsourcingInformation systemMarketingbusinessSophisticationFinanceManagement control systemmedia_commonLong Range Planning
researchProduct

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment

2012

This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…

oppimisympäristöHigher educationMultimediaComputer sciencebusiness.industryDesign-based researchCommunicationLearning environmentData securityCollaborative learningcomputer.software_genreGrounded theoryComputer Science ApplicationsEducationInformation and Communications TechnologyComputer-supported collaborative learningtietokoneavusteinenoppiminenComputingMilieux_COMPUTERSANDEDUCATIONMedia Technologycomputer-supported collaborated learningtietoturvabusinesscomputerlangattomat verkotOnline Journal of Communication and Media Technologies
researchProduct

Giving patients secure " google-like " access to their medical record

2008

International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …

patient identifier[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]watermarking[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]electronic signaturedirect accessdata securitymedical recordgridComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Yksityisyys ja luottamus hakukoneiden käytössä

2016

Tämä tutkimus käsittelee yksityisyyden ja luottamuksen merkitystä hakukoneissa. Tämä on tärkeää, sillä hakukoneista on muodostunut ihmisten pääsääntöinen tiedon lähde. Näin ollen hakukoneiden yleistyminen on johtanut siihen, että käyttäjistä kerätään yhä enemmän henkilökohtaisia tietoja. Tämän ansiosta käyttäjille on noussut hakukoneista paljon yksityisyyshuolia ja sitä kautta myös luottamus voi rikkoutua. Tämä tutkimus on toteutettu kirjallisuuskatsauksena ja pyrkii vastaamaan tutkimuskysymykseen: mitä käyttäjän yksityisyys ja luottamus tarkoittavat hakukoneiden käytön yhteydessä? Tutkimuksen tulosten mukaan käyttäjien tietoisuuden parantamisella voidaan vaikuttaa sekä kokemukseen yksityis…

profilointitietosuojadata privacypersonalisation.luottamusyksityisyystrusttietoturvaHakuohjelmatprivacydata securitysearch engines
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct