Publishing Security Policy of Digital Library’s Sensitive Data
نویسندگان
چکیده
منابع مشابه
Digital Publishing - Data Handling
SuperJournal is a research project aiming to identify what factors will make electronic journals successful and why. The project brings together some 20 society, university press and commercial publishers, who are providing electronic versions of around 50 journal titles in discrete areas of academic research. The “why?” is being established via a formal evaluation study being conducted by Loug...
متن کاملSensitive Data Exposure Prevention using Dynamic Database Security Policy
Today, the internet has become a 4th necessity for human after air, water and food. The internet is widely used for business. Now-a-days, billions of transactions are done online with the use of different applications. In today's world threats to security is becoming more and more sensitive issue, lots of attacks have taken place in recent years. It is observed that there are many leakages...
متن کاملPublishing Skewed Sensitive Microdata
A highly skewed microdata contains some sensitive attribute values that occur far more frequently than others. Such data violates the “eligibility condition” assumed by existing works for limiting the probability of linking an individual to a specific sensitive attribute value. Specifically, if the frequency of some sensitive attribute value is too high, publishing the sensitive attribute alone...
متن کاملStandardising and Harmonising Research Data Policy in Scholary Publishing
Iain Hrynaszkiewicz*, Head of Data Publishing, Springer Nature [email protected] Aliaksandr Birukou, Senior Editor, Computer Science, Springer-Verlag GmbH [email protected] Mathias Astell, Marketing Manager, Nature Research [email protected] Sowmya Swaminathan, Head of Editorial Policy, Nature Research [email protected] Amye Kenall, Global Head of Li...
متن کاملData attribute security and privacy in Collaborative distributed database Publishing
In this era, there are need to secure data in distributed database system. For collaborative data publishing some anonymization techniques are available such as generalization and bucketization. We consider the attack can call as “insider attack” by colluding data providers who may use their own records to infer others records. To protect our database from these types of attacks we used slicing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2013
ISSN: 1812-5638
DOI: 10.3923/itj.2013.8040.8044