BBSRC Data Sharing Policy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy-Carrying Data: A Step Towards Transparent Data Sharing

The emerging research and application domains of the Internet-of-Things and Big Data, together with socio-technical phenomena such as social networking, as well as mobile phones (equipped with sensors, GPS, etc.) make us – companies, research centres, people in general – all (sometimes unwittingly, possibly unwillingly) producers and consumers of data. A sensitive issue for data providers conce...

متن کامل

Amplifying Security for Cipher Text Policy Attribute Based Data Sharing

The rapid growth of usage of Digital technology leads to storage of all categories and types of data in digital media. As the technology is very fast in maintenance and also in data theft. We require providing security for the data stored in the digital media various data security techniques have introduced for the last 5 decades, but all those techniques are only key based techniques. All the ...

متن کامل

PLOS Genetics Data Sharing Policy: In Pursuit of Functional Utility

1 Department of Genetics, Stanford University School of Medicine, Stanford, California, United States of America, 2 HudsonAlpha Institute for Biotechnology, Huntsville, Alabama, United States of America, 3 Department of Biology, The University of North Carolina at Chapel Hill, Chapel Hill, North Carolina, United States of America, 4 Center for Integrative Genomics, School of Biology, Georgia In...

متن کامل

Policy Enforcement System for Inter-Organizational Data Sharing

Sharing data among organizations plays an important role in security and data mining. In this paper, the authors describe a Data Sharing Miner and Analyzer (DASMA) system that simulates data sharing among N organizations. Each organization has its own enforced policy. The N organizations share their data based on trusted third party. The system collects the released data from each organization,...

متن کامل

Data Sharing using Key Policy based Authentication & CHAP

Data Sharing between number of users whether in distributed systems or in cloud environment needs security from various attacks. Attribute based data sharing is also an efficient technique which provides Cipher text policy attribute-based encryption from the prevention from key escrow problem and user revocation [1]. Although the technique is efficient but further enhancements is needed for the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Precedings

سال: 2011

ISSN: 1756-0357

DOI: 10.1038/npre.2011.6015.1