A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Safeguarding Personal Data using Rights Management in Distributed Applications
[chapter]
2007
IFIP International Federation for Information Processing
However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure. ...
This paper explores the possibility to use an off-the-shelf document rights management platform to enable enforcement of usage policies. ...
Additionally, this approach can be used to shift the work of ensuring the correct handling of data from the person installing and maintaining the computing environment to the software vendor for the service ...
doi:10.1007/978-0-387-72367-9_39
fatcat:77qna7t365c6tgbmj6eyxuzzim
Software Tools for the Lifecycle Support of Safety Instrumented Systems
2006
Measurement and control (London. 1968)
These come with a wide range of both capability and price, but carefully selected tools are considered the most appropriate way forward for ensuring lifecycle support of safety instrumented systems (SIS ...
Software tools are not just the realm of the design engineer, and this paper draws on experiences to demonstrate the benefits that can be realised by SIS engineering practitioners and end users. ...
SIL determination exercises; • Greater visibility of recorded data for audit and regulation compliance purposes; • Interactive and simplified design processes; • Optimal selection of the design elements ...
doi:10.1177/002029400603901004
fatcat:c5n3kmiwrnf5taf2bgzo47uhtq
Development of Safeguards System Simulator Composed of Multi-Functional Cores
2008
Journal of Power and Energy Systems
For the time-series MUF data, Sequential Probability Ratio Test (SPRT) is used. After defining the first and second types of error probabilities, α and LEMUF data are shown in Fig. 2 (a) . ...
safeguards system. ...
doi:10.1299/jpes.2.899
fatcat:2bpdznfq4jdnlg5ra3t5yc6kmi
Students' Competency in Credit-Modular System and Analysis of Credit-Modular Efficiency Credit System in Teaching «Pediatrics»
2015
Zdorovʹe Rebenka
The analysis of the effectiveness of implementation of the credit-modular system of educational process in teaching the subject of «Pediatrics». ...
Regarding that the legal and ethical safeguards, human rights protection are integral components of quality, it will also contribute to improvement of medical care delivering. ...
transition to the new model of the educational process requires teaching staff in higher education in mastering the new system of psycho-pedagogical and methodological skills. ...
doi:10.22141/2224-0551.2.61.2015.75155
doaj:341a356a9cc0421481702cf6357575fd
fatcat:zlcgbp5wibb2fdshxshfu3tubu
Multibiometric Systems
[chapter]
2010
Vein Pattern Recognition
Acknowledgements The authors, Ron Ross and Marianne Swanson of the National Institute of Standards and Technology (NIST) wish to thank their colleagues who reviewed drafts of this document and contributed ...
In particular, we would like to acknowledge the contributions of Elaine Barker, Bill Burr, Tim Grance, Joan Hash, Arnold Johnson, Don Jones, Annabelle Lee, Mark ...
analysis, extended functional testing with test coverage analysis, regression analysis/testing, demonstrations, exercises, and penetration testing with Red Team option). ...
doi:10.1201/9781439821381-c7
fatcat:zhw2azssm5a6hgyqhobtwyvbce
Multibiometric systems
2004
Communications of the ACM
Acknowledgements The authors, Ron Ross and Marianne Swanson of the National Institute of Standards and Technology (NIST) wish to thank their colleagues who reviewed drafts of this document and contributed ...
In particular, we would like to acknowledge the contributions of Elaine Barker, Bill Burr, Tim Grance, Joan Hash, Arnold Johnson, Don Jones, Annabelle Lee, Mark ...
analysis, extended functional testing with test coverage analysis, regression analysis/testing, demonstrations, exercises, and penetration testing with Red Team option). ...
doi:10.1145/962081.962102
fatcat:vb7h44dgmfatdjups3o5gtfjwi
Privacy and Security Issues in Information Systems
1976
IEEE transactions on computers
An administrative and management overlay must be created that oversees all aspects of the security safeguard system; inspects , tests and audits them ; and controls movement of people , magne tic d iscs ...
' exercise of their rights of freedom of expression and of petitioning the government . ...
AFIPS System Review Manua l on Seci~rit~, AFIPS Press , Montvale , New Jersey , 1974. ...
doi:10.1109/tc.1976.1674604
fatcat:suk3sgj4rvaf3do3vlytoot52i
Effective safeguards for computer system integrity
1976
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76
Brief definitions are provided for all categories, and distributions of incidents over the various violation categories and over the applicable safeguards are presented. ...
This paper reports the findings of a project to identify types of computer system integrity safeguards that would have been effective in preventing, detecting, or mitigating the effects of actual reported ...
The viewpoints presented are those of the authors and not necessarily those of the Foundation. ...
doi:10.1145/1499799.1499811
dblp:conf/afips/NielsenRB76
fatcat:3jipqkx5qbedhmxxzvvyviz6wy
Editorial independence in an automated media system
2021
Internet Policy Review
ACKNOWLEDGEMENTS I would like to thank Natali Helberger, João Pedro Quintais, as well as the reviewers Kari Karppinen and Stephan Dreyer for their insightful comments. Any errors remain mine. ...
This would take the form of an infrastructure through which content and (meta)data can be pooled by media organisations and technology providers, and the tools necessary to manage and process this data ...
Algorithms are now used throughout the editorial process to help journalists and editors gather and analyse data, semi-automatically produce stories, and personalise news distribution (Beckett, 2019) ...
doi:10.14763/2021.3.1569
fatcat:55mrlc7forcvti7gqw5h6ketvm
ERP System Audit a Control Support For Knowledge Management
2008
Informatică economică
Obtained evidence evaluation can ensure whether the organization's IT&C system safeguard assets, maintains data integrity, and is operating effectively and efficiently to achieve the organization's goals ...
The audit process respecting the methodology based on: gathering information and plan; obtaining an understanding of internal controls; performing test of controls and substantive tests, develop a control ...
IT Audit IT system audit can generally be described as the process of obtaining and evaluating evidence to determine whether an IT system safeguards the organizational assets, uses resources efficiently ...
doaj:8c5c151089a44be3a9393a1bd2b174ae
fatcat:mynw6ddb7jeqxogjh62ubmpega
DESIGN SMART MINE EXERCISE POSITIONING USING GLOBAL POSITIONING SYSTEM (GPS)
2020
JOURNAL ASRO
Test results of GPS-based location tracking devices are obtained by the results of location data in latitude and longitude formats. ...
Build your exercise Smart mine positioning using Global Positioning System (GPS) Neo-M6. ...
The authors are also grateful to the anonymous reviewers and journal editorial board for their many insightful comments, which have significantly improved this article. ...
doi:10.37875/asro.v11i2.268
fatcat:zpuk26emfrg2fbf3kcb6v7isnm
Page 16 of Journal of Systems Management Vol. 36, Issue 4
[page]
1985
Journal of Systems Management
that shape the environment in which that data is collected and processed. ...
(That includes the safeguarding of its data assets.) ...
Validating and Verifying AI Systems
2020
Patterns
This means that the role and task of the system must be properly formulated; that the system must be bug free, be based on properly representative data, and can cope with anomalies and data quality issues ...
; and that its output is sufficiently accurate for the task. ...
For example, the European Union's General Data Protection Regulation (clause 71) says ''[automatic processing of data] should be subject to suitable safeguards, which should include . the right to . obtain ...
doi:10.1016/j.patter.2020.100037
pmid:33205105
pmcid:PMC7660449
fatcat:c6oqmqffcjdkbdkfd4tibv26qm
Security Within Financial Information Systems
[chapter]
1995
IFIP Advances in Information and Communication Technology
Information Technology seems to be developing in the direction of distributed or decentralised data processing and more flexible information systems. ...
This paper stresses the importance of integrity of financial data in commercial information systems for the financial auditor. Integrity of data is defined as giving a true and fair view of reality. ...
This investigation can be limited in time when the transaction and accounting systems offer enough safeguards for the reliability of the resulting data. ...
doi:10.1007/978-0-387-34873-5_3
fatcat:n2kuvcygffcovdqvcwxzpmd4fq
Privacy Protection Goals and Their Implications for eID Systems
[chapter]
2012
IFIP Advances in Information and Communication Technology
This text focuses on the application of the three new protection goals to eID systems such as government-issued electronic identity cards in different settings. ...
Protection goals such as confidentiality, integrity and availability have proved to be successful in evaluating information security risks and choosing appropriate safeguards. ...
The authors kindly thank Prof. Simone Fischer-Hübner and the anonymous reviewers for their detailed review comments and their valuable input to improve this contribution. ...
doi:10.1007/978-3-642-31668-5_19
fatcat:rwl2y6tzkfc4jjf6upkec4tvua
« Previous
Showing results 1 — 15 out of 63,918 results