7,500 research outputs found
Protection and Security Of Data And Information
Data and information are valuable assets owned by the University. The Board of Regents of the University System of Georgia Business Procedures Manual establishes that all institutional data is to be used with appropriate and relevant levels of access and with sufficient assurance of its security and integrity in compliance with existing laws, rules and regulations. As such, each institution has a responsibility to protect the confidentiality, integrity, and availability of data and information generated, accessed, modified, transmitted, stored or used by the University, any medium on which the data resides and regardless of format
Protection and security of data base information
Data bases are one of the most important components in every large informatics system which stores and processes data and information.Because data bases contain all of the valuable information about a company, its clients, its financial activity, they represent one of the key elements in the structure of an organization, which determines imperatives such as confidentiality, integrity and ease of data access.The current paper discuses the integrity of data bases and it refers to the validity and the coherence of stored data. Usually, integrity is defined in connection with terms of constraint, that are rules regarding coherence which the data base cannot infringe. Data base that integrity refers to information correctness and assumes to detect, correct and prevent errors that might have an effect on the data comprised by the data bases.
Security of data science and data science for security
In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure. In the second part about security for data science, we switch sides and present some applications where data science plays a critical role in pushing the state-of-the-art in securing information systems. This includes a detailed look at the potential and challenges of applying machine learning to the problem of detecting obfuscated JavaScripts
Capturing personal health data from wearable sensors
Recently, there has been a significant growth in pervasive computing and ubiquitous sensing which strives to develop and deploy sensing technology all around us. We are also seeing the emergence of applications such as environmental and personal health monitoring to leverage data from a physical world. Most of the developments in this area have been concerned with either developing the sensing technologies, or the infrastructure (middleware) to gather this data and the issues which have been addressed include power consumption on the devices, security of data transmission, networking challenges in gathering and storing the data and fault tolerance in the event of network and/or device failure. Research is focusing on harvesting and managing data and providing query capabilities
Recommended from our members
A heuristic evaluation of the Facebook's advertising tool beacon
Interface usability is critical to the successful adoption of information systems. The aim of this study is to evaluate interface of Facebook's advertising tool Beacon by using privacy heuristics [4]. Beacon represents an interesting case study because of the negative media and user backlash it received. The findings of heuristic evaluation suggest violation of privacy heuristics [4]. Here, analysis identified concerns about user choice and consent, integrity and security of data, and awareness and notice. Beacon was an innovative tool, therefore, its systematic evaluation was needed in order to identify privacy problems, their causes and subsequent consequences. The study provides useful insights to human computer interaction (HCI) designers of online social networks
Security of Data Collection and Sensor Group Management in Wireless Networks
Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups
THE ELECTRONIC SIGNATURE (E-SIGN) IN THE INFORMATION SOCIETY
This paper deals with the legislative and technical aspects, concerning the electronic signature and examples regarding the implementation of the e-sign software security solutions in the information society. One of the major problems the IT developers for complex systems have to deal with, is to provide the security of data and the information administered by these systems, as well as to certify their authentication by the electronic signature. The certification procedures and the encryption algorithms, used for the electronic signature are needed in todayâs information society.e-sign, software security, information security, Decision Support System(DSS)
- âŠ