Distributed Social Network - data security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Social Network - data security

The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can become. Users’ personal data can constitute...

متن کامل

Distributed Network Security

IP-based networks form the base of todays communication infrastructure. The interconnection of formerly isolated networks brings up severe security issues. The standard approach, to protect the own network from abuse, is the usage of filter mechanisms at the border to the foreign network. The raising complexity of protocols and the use of encryption techniques render most of these borderoriente...

متن کامل

Approach of Data Security in Local Network Using Distributed Firewalls

Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology...

متن کامل

Homeland Security Data Mining Using Social Network Analysis

The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon to help enhance the government’s ability to fight terrorism and other crimes. Keeping in mind the special characteristics of crimes and securityrelated data, data mining techniques can contribute in six areas of resear...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annales UMCS, Informatica

سال: 2012

ISSN: 2083-3628,1732-1360

DOI: 10.2478/v10065-012-0019-x