A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Blocking + Secure Matching = Secure Record Linkage
2011
Journal of Computing Science and Engineering
In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage. The secure framework we propose consists of two basic components. ...
This task becomes even more challenging when the requirement of data privacy rises. ...
The evaluation is made in terms of efficiency and complexity and in terms of protocol security.
A. ...
doi:10.5626/jcse.2011.5.3.223
fatcat:ja62jhmfofgu3d5cpzxvskk2zy
Data Security and Privacy in Cloud Computing
2014
International Journal of Distributed Sensor Networks
Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. ...
In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing. ...
The barrier and hurdles toward the rapid growth of cloud computing are data security and privacy issues. ...
doi:10.1155/2014/190903
fatcat:hewip3lmuvbf3kp6ue4lbhuply
Database Security: A Historical Perspective
[article]
2010
arXiv
pre-print
Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. ...
The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. ...
Also, some suggested approaches to design database specifically tailored to support standard privacy policies such as the ones expressed in P3P. ...
arXiv:1004.4022v1
fatcat:qosmugsvkzh4pmaeiqj2ysq3ay
Database security - concepts, approaches, and challenges
2005
IEEE Transactions on Dependable and Secure Computing
Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. ...
In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. ...
The work of Elisa Bertino is supported in part by the US National Science Foundation under the Project "Collaborative Research: A Comprehensive Policy -Driven Framework For Online Privacy Protection: Integrating ...
doi:10.1109/tdsc.2005.9
fatcat:6r3s2k2l25cdpgawjmp3rgtfue
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds
[chapter]
2016
Lecture Notes in Computer Science
In order to support the privacy-by-design development of the tools, we developed several cloud security patterns for common critical situations in the cloud-in the three fields of data storage in the cloud ...
security preserving cloud applications for the benefit of the end-users-who will no longer have to rely on contractual and legal instruments for ensuring, that privacy and security is enforced by cloud ...
The price in these situations is often paid by the end users: Systems and services are made available on a large scale before the data privacy and security concerns of the customers are fully addressed ...
doi:10.1007/978-3-319-44760-5_8
fatcat:w6uzti3defbqvmhdk2urftebxi
Privacy Risks and Security Practices in Digital Technologies
2019
International journal of recent technology and engineering
But the others know how to make use of it in favor of them. People need to be conscious and tailored to life in the digital age. ...
The aim is to create awareness among the people on security practices to safeguard from digital attacks. ...
concepts of trust, security and privacy [1] [2] . ...
doi:10.35940/ijrte.d5319.118419
fatcat:hzyir3fdw5dxznnv2jnxexfqim
E-Security Issues
2004
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. ...
In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding ...
Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. ...
doi:10.24297/ijct.v3i2c.2889
fatcat:k3xkz76nmzgaxoizo6mpgk3aa4
Security transparency: the next frontier for security research in the cloud
2015
Journal of Cloud Computing: Advances, Systems and Applications
of the salient issues of security and privacy in the cloud, larger initiatives, other than standards, aiming at enabling security transparency and a mutual auditability in the cloud remain to be seen. ...
In spite of these apparent advantages, the cloud model presents some challenges that hamper its wider adoption, most of which relate to security and privacy. ...
The authors also thanks Reijo Savola from VTT for his insights into cloud security concerns. ...
doi:10.1186/s13677-015-0037-5
fatcat:f6rur5syqfhezo6zdweyxgnxla
Security against Surveillance: IT Security as Resistance to Pervasive Surveillance
2018
Surveillance & Society
By assigning signals intelligence agencies the dual role of exploiting IT systems as well as securing them, a contradiction has been baked into our evolving notion of cyber security. ...
The cyber security project of the Five Eyes nations is expansive in scope and has proceeded along dangerous lines. ...
Morozov (2013) has made the argument that privacy is a weak value when we consider it as an end in itself. ...
doi:10.24908/ss.v16i1.5316
fatcat:lmntbzqgtvacbbzsbmwu5nxux4
Privacy and Identity Management
2008
IEEE Security and Privacy
However, the digitization of information-by facilitating the collection, storage, and sharing of large amounts of data-can exacerbate privacy risks inherent in identity management systems. ...
Recent work has looked toward more user-centric models that attempt to put individuals in charge of when, where, how, and to whom they disclose their personal information. ...
By determining which of these is appropriate for a particular system and grounding the system in a solid privacy framework, system designers will be on their way toward safeguarding privacy as they tackle ...
doi:10.1109/msp.2008.41
fatcat:ise5qe7ekbcovloop6cjn3i4mi
Software Security Requirements Gathering Instrument
2011
International Journal of Advanced Computer Science and Applications
The first step towards producing secured software is through gathering security requirements. ...
Proposed SSRGI will support the software developers in gathering security requirements in detail during requirements gathering phase. ...
To secure data from potential loss, a disaster recovery plan can be tailored to suit the requirements. Another such flaw lies in SQL injection in which databases are accessed by the hackers. ...
doi:10.14569/ijacsa.2011.020717
fatcat:cvxv47vo3fg45abwahhopurdwa
Security patterns 2.0
2018
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment - SEAD '18
CCS CONCEPTS • Security and privacy → Software and application security; Software security engineering; ...
In this vision paper, we conceive a new way for expressing security patterns, built on a set of reusable and well-known security building blocks. ...
Security measures in a system are only effective if they are enforced, typically via one or more enforcement points in a system. ...
doi:10.1145/3194707.3194715
dblp:conf/icse/BergheYJ18
fatcat:5stvdxw3hndzfkyq7rte7gj6iy
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
[chapter]
2017
Lecture Notes in Computer Science
In contrast to existing projects, the checks implemented in PrivacyScore cover a wider range of potential privacy and security issues. ...
Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process. ...
Acknowledgments This work has been co-funded by the DFG as part of project C.1 within the RTG 2050 "Privacy and Trust for Mobile Users". ...
doi:10.1007/978-3-319-67280-9_10
fatcat:a2tyi2yolbgrxagd7fza52g3hi
A Data Commons for Food Security
2017
Social Science Research Network
Market forces encourage participation in the data commons by granting users the ability to display a social certification mark. ...
Supported by an independent organization, our license supports SME data collectors, who need sophisticated legal tools; contributors, who need engagement, privacy, control, and benefit sharing; and consumers ...
The distribution license would seamlessly fulfil assurances of privacy, control, and openness made in the collection license. ...
doi:10.2139/ssrn.3008736
fatcat:32ivqevc4ng5nlyckjlguw5hee
Privacy Impact Assessment Template for Provenance
2016
2016 11th International Conference on Availability, Reliability and Security (ARES)
In this paper, we provide a Privacy Impact Assessment (PIA) template for identifying imminent privacy threats that arise from provenance graphs in an application-agnostic setting. ...
The PIA template identifies privacy threats, lists potential countermeasures, helps to manage personal data protection risks, and maintains compliance with privacy data protection laws and regulations. ...
Purpose-oriented disclosure of provenance graphs can be implemented with Hippocratic database systems [12] . ...
doi:10.1109/ares.2016.95
dblp:conf/IEEEares/ReubenMFPHM16
fatcat:psysbk6urvfcrcfevzagof76ay
« Previous
Showing results 1 — 15 out of 5,612 results