Filters








63,918 Hits in 5.4 sec

Safeguarding Personal Data using Rights Management in Distributed Applications [chapter]

Adolf Hohl, Alf Zugenmaier
2007 IFIP International Federation for Information Processing  
However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure.  ...  This paper explores the possibility to use an off-the-shelf document rights management platform to enable enforcement of usage policies.  ...  Additionally, this approach can be used to shift the work of ensuring the correct handling of data from the person installing and maintaining the computing environment to the software vendor for the service  ... 
doi:10.1007/978-0-387-72367-9_39 fatcat:77qna7t365c6tgbmj6eyxuzzim

Software Tools for the Lifecycle Support of Safety Instrumented Systems

Clive Timms
2006 Measurement and control (London. 1968)  
These come with a wide range of both capability and price, but carefully selected tools are considered the most appropriate way forward for ensuring lifecycle support of safety instrumented systems (SIS  ...  Software tools are not just the realm of the design engineer, and this paper draws on experiences to demonstrate the benefits that can be realised by SIS engineering practitioners and end users.  ...  SIL determination exercises; • Greater visibility of recorded data for audit and regulation compliance purposes; • Interactive and simplified design processes; • Optimal selection of the design elements  ... 
doi:10.1177/002029400603901004 fatcat:c5n3kmiwrnf5taf2bgzo47uhtq

Development of Safeguards System Simulator Composed of Multi-Functional Cores

Mitsutoshi SUZUKI, Hitoshi IHARA
2008 Journal of Power and Energy Systems  
For the time-series MUF data, Sequential Probability Ratio Test (SPRT) is used. After defining the first and second types of error probabilities, α and LEMUF data are shown in Fig. 2 (a) .  ...  safeguards system.  ... 
doi:10.1299/jpes.2.899 fatcat:2bpdznfq4jdnlg5ra3t5yc6kmi

Students' Competency in Credit-Modular System and Analysis of Credit-Modular Efficiency Credit System in Teaching «Pediatrics»

I.V. Shlimkevych
2015 Zdorovʹe Rebenka  
The analysis of the effectiveness of implementation of the credit-modular system of educational process in teaching the subject of «Pediatrics».  ...  Regarding that the legal and ethical safeguards, human rights protection are integral components of quality, it will also contribute to improvement of medical care delivering.  ...  transition to the new model of the educational process requires teaching staff in higher education in mastering the new system of psycho-pedagogical and methodological skills.  ... 
doi:10.22141/2224-0551.2.61.2015.75155 doaj:341a356a9cc0421481702cf6357575fd fatcat:zlcgbp5wibb2fdshxshfu3tubu

Multibiometric Systems [chapter]

2010 Vein Pattern Recognition  
Acknowledgements The authors, Ron Ross and Marianne Swanson of the National Institute of Standards and Technology (NIST) wish to thank their colleagues who reviewed drafts of this document and contributed  ...  In particular, we would like to acknowledge the contributions of Elaine Barker, Bill Burr, Tim Grance, Joan Hash, Arnold Johnson, Don Jones, Annabelle Lee, Mark  ...  analysis, extended functional testing with test coverage analysis, regression analysis/testing, demonstrations, exercises, and penetration testing with Red Team option).  ... 
doi:10.1201/9781439821381-c7 fatcat:zhw2azssm5a6hgyqhobtwyvbce

Multibiometric systems

Anil K. Jain, Arun Ross
2004 Communications of the ACM  
Acknowledgements The authors, Ron Ross and Marianne Swanson of the National Institute of Standards and Technology (NIST) wish to thank their colleagues who reviewed drafts of this document and contributed  ...  In particular, we would like to acknowledge the contributions of Elaine Barker, Bill Burr, Tim Grance, Joan Hash, Arnold Johnson, Don Jones, Annabelle Lee, Mark  ...  analysis, extended functional testing with test coverage analysis, regression analysis/testing, demonstrations, exercises, and penetration testing with Red Team option).  ... 
doi:10.1145/962081.962102 fatcat:vb7h44dgmfatdjups3o5gtfjwi

Privacy and Security Issues in Information Systems

Turn, Ware
1976 IEEE transactions on computers  
An administrative and management overlay must be created that oversees all aspects of the security safeguard system; inspects , tests and audits them ; and controls movement of people , magne tic d iscs  ...  ' exercise of their rights of freedom of expression and of petitioning the government .  ...  AFIPS System Review Manua l on Seci~rit~, AFIPS Press , Montvale , New Jersey , 1974.  ... 
doi:10.1109/tc.1976.1674604 fatcat:suk3sgj4rvaf3do3vlytoot52i

Effective safeguards for computer system integrity

Norman R. Nielsen, Brian Ruder, David H. Brandin
1976 Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76  
Brief definitions are provided for all categories, and distributions of incidents over the various violation categories and over the applicable safeguards are presented.  ...  This paper reports the findings of a project to identify types of computer system integrity safeguards that would have been effective in preventing, detecting, or mitigating the effects of actual reported  ...  The viewpoints presented are those of the authors and not necessarily those of the Foundation.  ... 
doi:10.1145/1499799.1499811 dblp:conf/afips/NielsenRB76 fatcat:3jipqkx5qbedhmxxzvvyviz6wy

Editorial independence in an automated media system

Max van Drunen
2021 Internet Policy Review  
ACKNOWLEDGEMENTS I would like to thank Natali Helberger, João Pedro Quintais, as well as the reviewers Kari Karppinen and Stephan Dreyer for their insightful comments. Any errors remain mine.  ...  This would take the form of an infrastructure through which content and (meta)data can be pooled by media organisations and technology providers, and the tools necessary to manage and process this data  ...  Algorithms are now used throughout the editorial process to help journalists and editors gather and analyse data, semi-automatically produce stories, and personalise news distribution (Beckett, 2019)  ... 
doi:10.14763/2021.3.1569 fatcat:55mrlc7forcvti7gqw5h6ketvm

ERP System Audit a Control Support For Knowledge Management

Traian SURCEL, Cristian AMANCEI
2008 Informatică economică  
Obtained evidence evaluation can ensure whether the organization's IT&C system safeguard assets, maintains data integrity, and is operating effectively and efficiently to achieve the organization's goals  ...  The audit process respecting the methodology based on: gathering information and plan; obtaining an understanding of internal controls; performing test of controls and substantive tests, develop a control  ...  IT Audit IT system audit can generally be described as the process of obtaining and evaluating evidence to determine whether an IT system safeguards the organizational assets, uses resources efficiently  ... 
doaj:8c5c151089a44be3a9393a1bd2b174ae fatcat:mynw6ddb7jeqxogjh62ubmpega

DESIGN SMART MINE EXERCISE POSITIONING USING GLOBAL POSITIONING SYSTEM (GPS)

Avando Bastari, Eko Saputra, Sunarta Sunarta, Cucuk Wahyudianto
2020 JOURNAL ASRO  
Test results of GPS-based location tracking devices are obtained by the results of location data in latitude and longitude formats.  ...  Build your exercise Smart mine positioning using Global Positioning System (GPS) Neo-M6.  ...  The authors are also grateful to the anonymous reviewers and journal editorial board for their many insightful comments, which have significantly improved this article.  ... 
doi:10.37875/asro.v11i2.268 fatcat:zpuk26emfrg2fbf3kcb6v7isnm

Page 16 of Journal of Systems Management Vol. 36, Issue 4 [page]

1985 Journal of Systems Management  
that shape the environment in which that data is collected and processed.  ...  (That includes the safeguarding of its data assets.)  ... 

Validating and Verifying AI Systems

David J. Hand, Shakeel Khan
2020 Patterns  
This means that the role and task of the system must be properly formulated; that the system must be bug free, be based on properly representative data, and can cope with anomalies and data quality issues  ...  ; and that its output is sufficiently accurate for the task.  ...  For example, the European Union's General Data Protection Regulation (clause 71) says ''[automatic processing of data] should be subject to suitable safeguards, which should include . the right to . obtain  ... 
doi:10.1016/j.patter.2020.100037 pmid:33205105 pmcid:PMC7660449 fatcat:c6oqmqffcjdkbdkfd4tibv26qm

Security Within Financial Information Systems [chapter]

W. Fred de Koning
1995 IFIP Advances in Information and Communication Technology  
Information Technology seems to be developing in the direction of distributed or decentralised data processing and more flexible information systems.  ...  This paper stresses the importance of integrity of financial data in commercial information systems for the financial auditor. Integrity of data is defined as giving a true and fair view of reality.  ...  This investigation can be limited in time when the transaction and accounting systems offer enough safeguards for the reliability of the resulting data.  ... 
doi:10.1007/978-0-387-34873-5_3 fatcat:n2kuvcygffcovdqvcwxzpmd4fq

Privacy Protection Goals and Their Implications for eID Systems [chapter]

Harald Zwingelberg, Marit Hansen
2012 IFIP Advances in Information and Communication Technology  
This text focuses on the application of the three new protection goals to eID systems such as government-issued electronic identity cards in different settings.  ...  Protection goals such as confidentiality, integrity and availability have proved to be successful in evaluating information security risks and choosing appropriate safeguards.  ...  The authors kindly thank Prof. Simone Fischer-Hübner and the anonymous reviewers for their detailed review comments and their valuable input to improve this contribution.  ... 
doi:10.1007/978-3-642-31668-5_19 fatcat:rwl2y6tzkfc4jjf6upkec4tvua
« Previous Showing results 1 — 15 out of 63,918 results