Filters








5,612 Hits in 5.3 sec

Secure Blocking + Secure Matching = Secure Record Linkage

Alexandros Karakasidis, Vassilios S. Verykios
2011 Journal of Computing Science and Engineering  
In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage. The secure framework we propose consists of two basic components.  ...  This task becomes even more challenging when the requirement of data privacy rises.  ...  The evaluation is made in terms of efficiency and complexity and in terms of protocol security. A.  ... 
doi:10.5626/jcse.2011.5.3.223 fatcat:ja62jhmfofgu3d5cpzxvskk2zy

Data Security and Privacy in Cloud Computing

Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu
2014 International Journal of Distributed Sensor Networks  
Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture.  ...  In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.  ...  The barrier and hurdles toward the rapid growth of cloud computing are data security and privacy issues.  ... 
doi:10.1155/2014/190903 fatcat:hewip3lmuvbf3kp6ue4lbhuply

Database Security: A Historical Perspective [article]

Paul Lesov
2010 arXiv   pre-print
Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security.  ...  The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized.  ...  Also, some suggested approaches to design database specifically tailored to support standard privacy policies such as the ones expressed in P3P.  ... 
arXiv:1004.4022v1 fatcat:qosmugsvkzh4pmaeiqj2ysq3ay

Database security - concepts, approaches, and challenges

E. Bertino, R. Sandhu
2005 IEEE Transactions on Dependable and Secure Computing  
Also, techniques for data integrity and availability specifically tailored to database systems must be adopted.  ...  In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques.  ...  The work of Elisa Bertino is supported in part by the US National Science Foundation under the Project "Collaborative Research: A Comprehensive Policy -Driven Framework For Online Privacy Protection: Integrating  ... 
doi:10.1109/tdsc.2005.9 fatcat:6r3s2k2l25cdpgawjmp3rgtfue

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds [chapter]

Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti
2016 Lecture Notes in Computer Science  
In order to support the privacy-by-design development of the tools, we developed several cloud security patterns for common critical situations in the cloud-in the three fields of data storage in the cloud  ...  security preserving cloud applications for the benefit of the end-users-who will no longer have to rely on contractual and legal instruments for ensuring, that privacy and security is enforced by cloud  ...  The price in these situations is often paid by the end users: Systems and services are made available on a large scale before the data privacy and security concerns of the customers are fully addressed  ... 
doi:10.1007/978-3-319-44760-5_8 fatcat:w6uzti3defbqvmhdk2urftebxi

Privacy Risks and Security Practices in Digital Technologies

2019 International journal of recent technology and engineering  
But the others know how to make use of it in favor of them. People need to be conscious and tailored to life in the digital age.  ...  The aim is to create awareness among the people on security practices to safeguard from digital attacks.  ...  concepts of trust, security and privacy [1] [2] .  ... 
doi:10.35940/ijrte.d5319.118419 fatcat:hzyir3fdw5dxznnv2jnxexfqim

E-Security Issues

Mani Arora
2004 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices.  ...  In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding  ...  Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer.  ... 
doi:10.24297/ijct.v3i2c.2889 fatcat:k3xkz76nmzgaxoizo6mpgk3aa4

Security transparency: the next frontier for security research in the cloud

Moussa Ouedraogo, Severine Mignon, Herve Cholez, Steven Furnell, Eric Dubois
2015 Journal of Cloud Computing: Advances, Systems and Applications  
of the salient issues of security and privacy in the cloud, larger initiatives, other than standards, aiming at enabling security transparency and a mutual auditability in the cloud remain to be seen.  ...  In spite of these apparent advantages, the cloud model presents some challenges that hamper its wider adoption, most of which relate to security and privacy.  ...  The authors also thanks Reijo Savola from VTT for his insights into cloud security concerns.  ... 
doi:10.1186/s13677-015-0037-5 fatcat:f6rur5syqfhezo6zdweyxgnxla

Security against Surveillance: IT Security as Resistance to Pervasive Surveillance

Mike Zajko
2018 Surveillance & Society  
By assigning signals intelligence agencies the dual role of exploiting IT systems as well as securing them, a contradiction has been baked into our evolving notion of cyber security.  ...  The cyber security project of the Five Eyes nations is expansive in scope and has proceeded along dangerous lines.  ...  Morozov (2013) has made the argument that privacy is a weak value when we consider it as an end in itself.  ... 
doi:10.24908/ss.v16i1.5316 fatcat:lmntbzqgtvacbbzsbmwu5nxux4

Privacy and Identity Management

Marit Hansen, Ari Schwartz, Alissa Cooper
2008 IEEE Security and Privacy  
However, the digitization of information-by facilitating the collection, storage, and sharing of large amounts of data-can exacerbate privacy risks inherent in identity management systems.  ...  Recent work has looked toward more user-centric models that attempt to put individuals in charge of when, where, how, and to whom they disclose their personal information.  ...  By determining which of these is appropriate for a particular system and grounding the system in a solid privacy framework, system designers will be on their way toward safeguarding privacy as they tackle  ... 
doi:10.1109/msp.2008.41 fatcat:ise5qe7ekbcovloop6cjn3i4mi

Software Security Requirements Gathering Instrument

Smriti Jain, Maya Ingle
2011 International Journal of Advanced Computer Science and Applications  
The first step towards producing secured software is through gathering security requirements.  ...  Proposed SSRGI will support the software developers in gathering security requirements in detail during requirements gathering phase.  ...  To secure data from potential loss, a disaster recovery plan can be tailored to suit the requirements. Another such flaw lies in SQL injection in which databases are accessed by the hackers.  ... 
doi:10.14569/ijacsa.2011.020717 fatcat:cvxv47vo3fg45abwahhopurdwa

Security patterns 2.0

Alexander van den Berghe, Koen Yskout, Wouter Joosen
2018 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment - SEAD '18  
CCS CONCEPTS • Security and privacy → Software and application security; Software security engineering;  ...  In this vision paper, we conceive a new way for expressing security patterns, built on a set of reusable and well-known security building blocks.  ...  Security measures in a system are only effective if they are enforced, typically via one or more enforcement points in a system.  ... 
doi:10.1145/3194707.3194715 dblp:conf/icse/BergheYJ18 fatcat:5stvdxw3hndzfkyq7rte7gj6iy

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites [chapter]

Max Maass, Pascal Wichmann, Henning Pridöhl, Dominik Herrmann
2017 Lecture Notes in Computer Science  
In contrast to existing projects, the checks implemented in PrivacyScore cover a wider range of potential privacy and security issues.  ...  Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process.  ...  Acknowledgments This work has been co-funded by the DFG as part of project C.1 within the RTG 2050 "Privacy and Trust for Mobile Users".  ... 
doi:10.1007/978-3-319-67280-9_10 fatcat:a2tyi2yolbgrxagd7fza52g3hi

A Data Commons for Food Security

Jeremiah Baarbb, Meghan J B, Jeremy de Beer
2017 Social Science Research Network  
Market forces encourage participation in the data commons by granting users the ability to display a social certification mark.  ...  Supported by an independent organization, our license supports SME data collectors, who need sophisticated legal tools; contributors, who need engagement, privacy, control, and benefit sharing; and consumers  ...  The distribution license would seamlessly fulfil assurances of privacy, control, and openness made in the collection license.  ... 
doi:10.2139/ssrn.3008736 fatcat:32ivqevc4ng5nlyckjlguw5hee

Privacy Impact Assessment Template for Provenance

Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hubner, Heather S. Packer, Hans Hedbom, Luc Moreau
2016 2016 11th International Conference on Availability, Reliability and Security (ARES)  
In this paper, we provide a Privacy Impact Assessment (PIA) template for identifying imminent privacy threats that arise from provenance graphs in an application-agnostic setting.  ...  The PIA template identifies privacy threats, lists potential countermeasures, helps to manage personal data protection risks, and maintains compliance with privacy data protection laws and regulations.  ...  Purpose-oriented disclosure of provenance graphs can be implemented with Hippocratic database systems [12] .  ... 
doi:10.1109/ares.2016.95 dblp:conf/IEEEares/ReubenMFPHM16 fatcat:psysbk6urvfcrcfevzagof76ay
« Previous Showing results 1 — 15 out of 5,612 results