Confidential Data Protection as a Means of Ensuring Information Security
نویسندگان
چکیده
منابع مشابه
Biosafety Data as Confidential Business Information
Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.
متن کاملInformation Disclosure as a Means to Security
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The model combines both the features of the Stackelberg Security Games (SSGs) model and of the Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous security state that serves as the Defender’s private information; ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملStochastic Protection of Confidential Information in Databases: A Hybrid of Data Perturbation and Query Restriction
Data perturbation and query restriction are two of the main methods that have been developed to protect confidential data in statistical database systems. In the former the confidential data is systematically changed to maintain its distributional properties, and to yield answers to queries that are statistically similar to those that would have resulted from the original data. The latter provi...
متن کاملModelling For Ensuring Information Security Of The Distributed Information Systems
In the paper the concept of the permitted interactions is defined, i.e. such interactions are necessary for the tasks which are legally started at present. Any other interactions are considered as forbidden. The main objective is definition, what interactions are permitted during this period of time. For the solution of this problem it is offered to model the needs for interactions depending on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: KnE Social Sciences
سال: 2018
ISSN: 2518-668X
DOI: 10.18502/kss.v3i2.1528