7,500 research outputs found

    Privacy and Security of Data

    Get PDF

    Protection and Security Of Data And Information

    Get PDF
    Data and information are valuable assets owned by the University. The Board of Regents of the University System of Georgia Business Procedures Manual establishes that all institutional data is to be used with appropriate and relevant levels of access and with sufficient assurance of its security and integrity in compliance with existing laws, rules and regulations. As such, each institution has a responsibility to protect the confidentiality, integrity, and availability of data and information generated, accessed, modified, transmitted, stored or used by the University, any medium on which the data resides and regardless of format

    Protection and security of data base information

    Get PDF
    Data bases are one of the most important components in every large informatics system which stores and processes data and information.Because data bases contain all of the valuable information about a company, its clients, its financial activity, they represent one of the key elements in the structure of an organization, which determines imperatives such as confidentiality, integrity and ease of data access.The current paper discuses the integrity of data bases and it refers to the validity and the coherence of stored data. Usually, integrity is defined in connection with terms of constraint, that are rules regarding coherence which the data base cannot infringe. Data base that integrity refers to information correctness and assumes to detect, correct and prevent errors that might have an effect on the data comprised by the data bases.

    Security of data science and data science for security

    Get PDF
    In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure. In the second part about security for data science, we switch sides and present some applications where data science plays a critical role in pushing the state-of-the-art in securing information systems. This includes a detailed look at the potential and challenges of applying machine learning to the problem of detecting obfuscated JavaScripts

    Capturing personal health data from wearable sensors

    Get PDF
    Recently, there has been a significant growth in pervasive computing and ubiquitous sensing which strives to develop and deploy sensing technology all around us. We are also seeing the emergence of applications such as environmental and personal health monitoring to leverage data from a physical world. Most of the developments in this area have been concerned with either developing the sensing technologies, or the infrastructure (middleware) to gather this data and the issues which have been addressed include power consumption on the devices, security of data transmission, networking challenges in gathering and storing the data and fault tolerance in the event of network and/or device failure. Research is focusing on harvesting and managing data and providing query capabilities

    Security of Data Collection and Sensor Group Management in Wireless Networks

    Get PDF
    Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups

    THE ELECTRONIC SIGNATURE (E-SIGN) IN THE INFORMATION SOCIETY

    Get PDF
    This paper deals with the legislative and technical aspects, concerning the electronic signature and examples regarding the implementation of the e-sign software security solutions in the information society. One of the major problems the IT developers for complex systems have to deal with, is to provide the security of data and the information administered by these systems, as well as to certify their authentication by the electronic signature. The certification procedures and the encryption algorithms, used for the electronic signature are needed in today’s information society.e-sign, software security, information security, Decision Support System(DSS)
    • 

    corecore