• Nenhum resultado encontrado

privacy and security

E-Commerce Privacy and Security System

E-Commerce Privacy and Security System

... Privacy is an interdisciplinary ...their privacy is debated in many fields, including the areas of law, politics, philosophy, sociology, and more recently computer ...preserving security in ...

12

Cyber-security, privacy and trust: trends in the Latin American and Caribbean region and the way forward

Cyber-security, privacy and trust: trends in the Latin American and Caribbean region and the way forward

... between security and privacy and defined that “building confidence and security in the use of ICTs, notably on topics such as personal data protection, privacy, ...

6

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

... manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online ...

5

Privacy as a threat to public security: A story of moral entrepreneurship

Privacy as a threat to public security: A story of moral entrepreneurship

... Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (em português, “Unindo e fortalecendo a América através do uso de ferramentas necessárias para ...

12

Privacy and eGovernment in Saudi Arabia

Privacy and eGovernment in Saudi Arabia

... visible privacy statements on Saudi government websites as a measure of Saudi eGovernment’s management of privacy and security concerns and surveyed Saudi eGovernment users’ ...

4

Patient empowerment. Information and privacy mechanisms for the 21st century

Patient empowerment. Information and privacy mechanisms for the 21st century

... patient and what the patient can do to help to improve his own health ...role and impotent to exercise his rights as the owner of his own Electronic Health Record ...of privacy incidents, resulting ...

122

A Privacy Preserving Approach to Analyze Security in  VoIPSystem

A Privacy Preserving Approach to Analyze Security in VoIPSystem

... automatically and are simple and computationally feasible to ...speech and decorrelating the spectrum using a cosine transform, then taking the first (most significant) ...

7

Handling Security in a Privacy-preserving Health Research Ecosystem

Handling Security in a Privacy-preserving Health Research Ecosystem

... owners and there might be too many resources in the repository for only one person to manage, though they expressed that this limitation might be acceptable for smaller ...Keycloak, and one solution would ...

170

Security and Privacy for Implantable Cardioverter Defibrillators

Security and Privacy for Implantable Cardioverter Defibrillators

... communications security level, mainly due to the difficulty in balancing privacy and security with safety and ...on security and privacy of communications between ...

108

Complying with privacy legislation

Complying with privacy legislation

... with, and the overall structure of the Web application (see ...of privacy-enhanced personalization, pointed out that online users value personalization, and at the same time, personalization of ...

28

Smartphone and privacy concerns: not so smart

Smartphone and privacy concerns: not so smart

... Attitudes and behaviors are usually not guided by an absolute value, but by priority and antagonistic ...structure and association of these in a single value system (Costa, 2012; Pereira et ...values ...

63

PRIVACY AGENTS IN THE IOT: CONSIDERATIONS ON HOW TO BALANCE AGENT AUTONOMY AND USER CONTROL IN PRIVACY DECISIONS

PRIVACY AGENTS IN THE IOT: CONSIDERATIONS ON HOW TO BALANCE AGENT AUTONOMY AND USER CONTROL IN PRIVACY DECISIONS

... VI and VII define ’connection record’ and ’internet application’, where the first determines as part of the connection record information about the date and time of the start and finish of a ...

201

Location Privacy Using User Anonymity and Dummy Locations

Location Privacy Using User Anonymity and Dummy Locations

... the privacy of our location information while taking advantage of location-aware services, we wish to hide our true identity from the applications receiving our location; at a very high level, this can be taken as ...

4

Privacy in cloud computing

Privacy in cloud computing

... subject and the quantity of new products using the cloud as their ...topic, and mention some of the products that are already taking advantage of cloud computing ...the security issues they might ...

89

Privacy preserving protocols for smart meters and electric vehicles

Privacy preserving protocols for smart meters and electric vehicles

... automation and con- trols in various aspects, such as air conditioning, lighting, security, among ...natural and allows energy savings, by decreasing the amount of different controllers, and ...

74

Health data privacy and confidentiality rights

Health data privacy and confidentiality rights

... gerprints and photographs and extensive video surveillance are now widely accepted and perceived as normal ...tolerating privacy conces- sions for shared purposes such as common ...

11

Cloud computing and security.

Cloud computing and security.

... availability, security, privacy and data integrity are on the top of ...technological and legal matters, bearing in mind that the service provider can be legally responsible for any ...

8

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

... attacks and also it cannot provide user privacy. All privacy analysis presented based on a formal RFID privacy model that proposed by Ouafi and ...weaknesses. Security analysis ...

9

Security and privacy in network namespaces

Security and privacy in network namespaces

... formats and functions [132] that such a system should ...practice and instead different services often implement HTTP applications that resemble name res- olution ...HTTP and email addresses) ...

162

Privacy and identity selection

Privacy and identity selection

... OpenID and SAML lie above the Application Layer and it would be desireable that integration of these technologies with the work presented here would be ...the privacy requirements in the underlying ...

99

Show all 10000 documents...

temas relacionados