Filters








8 Hits in 4.9 sec

Preserving Obliviousness Characteristic of Honeypot database

Shyam K. Gupta, Anand Gupta, Renu Damor, Vikram Goyal, Sangeeta Sabharwal
2006 International Conference on Management of Data  
We propose that a suspected user be provided with synthetic information (in place of denial of access) with the help of which the administrator could confirm the suspicion.  ...  The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user.  ...  We wish to thank the N.T.R.O. and Ministry of Information Technology, Government of India for funding the project.  ... 
dblp:conf/comad/GuptaGDGS06 fatcat:heyclpceafecnkodat6dh7zdlm

Disclosure detection over data streams in database publishing

Deming Dou, Stéphane Coulondre
2011 Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop on - PhD '11  
, quite a few techniques can be seen among literatures for detecting information disclosure in the process of data transmission.  ...  Recently, a number of privacy-preserving techniques have been proposed, however, they are either precontrols or post-controls and limited in protection of privacy without information loss or distortion  ...  [13] proposed a method of detecting possible privacy violations using disjoint queries, based on determining if a secret query and a published view can return tuples in common.  ... 
doi:10.1145/1966874.1966876 dblp:conf/edbt/DouC11 fatcat:elnddda6gndwdbznm6o6szajxy

Cyber Crime Against Women In India [article]

HC User, Nyaay Shastra
2022
The paper concludes by considering the loopholes in the system, that neither the provisions of the Indian Penal Code, 1860 nor the Information Technology Act, 2000 satisfactorily deal with such offences  ...  In the digital age, Information and communication Technology(ICT) is benefiting billions across the world by bridging certain gaps and multiplying human potential in every walk of life.  ...  Ritu Kohli Case pg. 8 Infringement : Privacy infringement generally means the violation of privacy of any individual.  ... 
doi:10.17613/a7wb-9e20 fatcat:lvcmhsircne5tgsoqejrrekkgi

Trafficking in Human Beings [chapter]

Monika Smit, Peter Laan
2014 Encyclopedia of Criminology and Criminal Justice  
Bureau NRM The Hague 2005 The universal notion of protecting human dignity, which is at stake in case of THB, is underlined by the words 'Mensenhandel is verboden' (trafficking in human beings is prohibited  ...  Following the example of the Dutch artist Henk Visch, who organised in 2003 an exposition under the title 'Mensenhandel is verboden', the words are put in handwriting to stress the importance of their  ...  The call to the government (in the First Report) to continue to devote intensive attention to macro factors that are or could be the root cause of international THB, such as the lack of employment and  ... 
doi:10.1007/978-1-4614-5690-2_631 fatcat:regdddtjvjeo5onomneezoi3s4

Curbing Software Piracy in eCommerce: Compatibility with Human Rights: Challenges and Possible Solutions [chapter]

Mahboob Murshed
Human Rights and Intellectual Property Rights  
in the provision of telecommunication networks and services, lack of locally created content, and uneven ability to derive economic and social benefits from information-intensive activities." 239 The  ...  In a recent case of direct mail solicitation detected in the U.S.A. where the infringer was offering roughly $15,000 worth of software on a set of CDs for only a few hundred dollars.  ... 
doi:10.1163/ej.9789004162907.i-292.5 fatcat:oasjx3ns3fajpjxc5ny54qeyvi

Women in the Criminal Justice System: International examples & national responses

(:Unkn) Unknown, Universitätsbibliothek Tübingen, Universitätsbibliothek Tübingen, Natalia Ollus, Sami Nevala
2018
The workshop Women in the Criminal Justice System was held during the Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders.  ...  The workshop was divided into four modules: Women as offenders and prisoners, Women as victims and survivors, Women in the criminal justice system, and Research and policy issues.  ...  The latter was recognized as both a gender-based form of crime and a violation of the basic human rights of women.  ... 
doi:10.15496/publikation-23611 fatcat:ip5prcueifhhblhz3qhan57unq

Thinking about feeling

Madhvi Zutshi
2015
the novel form which specifically attempts to navigate the gap between the felt intensity of particular affective responses and a generically-mandated drive towards a self-consciousness in the novel.  ...  The literary phenomenon of sensibility in the eighteenth-century novel denoted an ethical responsiveness in a character to the distress of others.  ...  Shaftesbury stresses on our mind's sensor in detecting an ill action just as we might detect an off-key note in music or an incongruity in a painting: The mind, which is spectator or auditor of other minds  ... 
doi:10.7282/t30r9r8s fatcat:qjbmv747tbg45hgsfditveildu

Tuners of souls

Sonali Barua
2010
In Chapter 2 I read a selection of musical novels and fictionalized autobiographies in an attempt to understand the crucial roles of the raga music guru and of musical autobiography in the process of postcolonial  ...  I argue that Indian English authors who engage with the question of music write in response to the phenomenon of guru worship both in India and abroad.  ...  (1969) , which highlights and reworks the stories of the major women characters in the Mahabharata, can also be cited.  ... 
doi:10.7282/t3bg2p3d fatcat:ykimlufvizavxip7fgruks6k6m