6 research outputs found

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, which allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, that allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    Articulation Point Based Quasi Identifier Detection for Privacy Preserving in Distributed Environment

    Get PDF
    These days, huge data size requires high-end resources to be stored in IT organizations premises. They depend on cloud for additional resource necessities. Since cloud is a third-party, we cannot guarantee high security for our information as it might be misused. This necessitates the need of privacy in data before sharing to the cloud. Numerous specialists proposed several methods, wherein they attempt to discover explicit identifiers and sensitive data before distributing it. But, quasi-identifiers are attributes which can spill data of explicit identifiers utilizing background knowledge. Analysts proposed strategies to find quasi- identifiers with the goal that these properties can likewise be considered for implementing privacy. But, these techniques suffer from many drawbacks like higher time consumption and extract more quasi identifiers which decreases data utility. The proposed work overcomes this drawback by extracting minimum required quasi attributes with minimum time complexity

    Defense in Depth: Multilayer of security

    Get PDF
    Many types and methodologies of attacks have been developed in order to target the victims in different ways affecting its resources and assets. This paper reviews the defense in depth concept that has been developed in which multilayer of security controls are implemented to protect resources and assets from such attackers through consuming all the resources and capabilities of the attacker before malicious activities affect such targeted resources and assets

    Smart Contracts with Blockchain in the Public Sector

    Get PDF
    The appearance of so-called block chains or Blockchain with the promise of transforming trust and the way value is exchanged, joins the expansion of the technological capabilities of organizations to achieve higher levels of productivity and innovation. This is how Blockchain-based techniques are being applied to many fields, focusing in this article on the public sector, as a possible solution to the demands for transparency, participation and citizen cooperation that society demands; due to the possibility of disintermediation based on automated transactions and on the responsibility and security in the management of official blockchain records. This could obstruct corruption and make government services more transparent and efficient. Although, it investigates about applications in the public sector under the Blockchain system, such as transactions, agreements, property registries and innovations, developments and other assets; Special emphasis is placed on the possibility of implementing Smart Contracts (mechanisms that aim to eliminate intermediaries to simplify processes) in public procurement procedures, given that it is in this type of activity where high levels of corruption are generated. It is concluded then that Europe has the largest number of blockchain initiatives worldwide, while Latin America, except for the case of Peru, lacks this type of applications, being this continent exactly where there are the countries with the highest levels of corruption. It concludes with a recommendation to use blockchain along with smart contracts through platforms such as Ethereum or Lisk, mainly given its flexibility and current development on topics with similar functionalities

    Introduction to CRM 4.0 an approach to the tourism sector

    Get PDF
    El CRM 4.0 surge de la necesidad de retener a los clientes, brindando una prestación de servicio más personalizado por medio de las tecnologías de la información, este artículo establece una introducción que permite la integración de la filosofía CRM al sector turismo permitiendo la automatización de procesos importantes de fidelización de los turistas, de recolección de datos para analizar, retener y generar una mejor experiencia en clientes actuales y potenciales del sector por medio de una arquitectura modelo de industria 4.0, se presentan diferentes argumentos y conceptos que nos permiten comprender la relevancia de la implementación del CRM en el turismo, Se enfatiza en las tecnologías que pertenecen a la industria 4.0 como un aspecto que facilita la explicación del nivel de expectativas , percepciones de los clientes y mejora la experiencia turística.The CRM 4.0 arises from the need to retain customers, providing a more personalized service through information technology, this article establishes an introduction that allows the integration of the CRM philosophy to the tourism sector allowing the automation of important processes of tourist loyalty, data collection to analyze, retain and generate a better experience in current and potential customers in the sector through an architecture, different arguments and concepts are presented that allow us to understand the relevance of CRM implementation in the tourism, Emphasizes on the technologies that belong to industry 4.0 as an aspect that facilitates the explanatio
    corecore