نتایج جستجو برای: security and privacy

تعداد نتایج: 16851797  

Journal: :PVLDB 2012
Divyakant Agrawal Amr El Abbadi Shiyuan Wang

Cloud computing becomes a successful paradigm for data computing and storage. Increasing concerns about data security and privacy in the cloud, however, have emerged. Ensuring security and privacy for data management and query processing in the cloud is critical for better and broader uses of the cloud. This tutorial covers some common cloud security and privacy threats and the relevant researc...

2015
Vaishali Patel Ellen Beckjord Richard P Moser Penelope Hughes Bradford W Hesse

BACKGROUND Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. OBJECTIVE The aim of this study was to describe nati...

2014
Krunal K Patel Risha Tiwari

There are many distributed and centralized data mining techniques often used for various applications. Privacy and security issues of these techniques are recently investigated with a conclusion that they reveal information or data to each other clients involved to find global valid results. But because of privacy issues, involving clients do not want to share such type of data. Recently many c...

2012
Luca Delgrossi Tao Zhang

vehicle safety communications protocols security and privacy vehicle safety communications security bme-hit vehicle safety communications protocols security and security and privacy for a connected vehicle environment surveillance, privacy and the ethics of vehicle safety surveillance, privacy and the ethics of vehicle safety personal information and the design of vehicle safety vehicle safety ...

Journal: :IEEE Security & Privacy 2015
Shari Lawrence Pfleeger

H ow do we realistically assess the past, present, and future of our security and privacy technology? Like Spider-Man, with our great computing power comes great responsibility—to use our power wisely, to design high-quality security and privacy applications, and to quickly correct errors and improve results. The difficulty of predicting the future of security and privacy is often accompanied b...

2007
Hua Dai Lakshmi S. Iyer Rahul Singh

This study investigates the composition of consumer’s security and privacy perceptions of mobile commerce (m-commerce) and the factors shaping these security and privacy perceptions. Based on literature review, we examined the effect of eight determinants: information type, information collection, secondary use of information, error, unauthorized access, location awareness, information transfer...

Journal: :IJTD 2012
Syed Hassan Faraz Syed Hassan Tanvir Saqib Saeed

Social web has changed the concept of leisure time. As a result street neighbors have been replaced by e-neighbors and walls have become e-walls to share ideas and gossips. Despite so many advantages we cannot ignore potential threats to user privacy and security. In order to be extremely usable, such systems should have strict security and privacy policies in place. In this paper the authors f...

Journal: :Communications on Applied Electronics 2017

Journal: :Indian Journal of Science and Technology 2017

Journal: :Communications of the Association for Information Systems 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید