نتایج جستجو برای: security and privacy
تعداد نتایج: 16851797 فیلتر نتایج به سال:
Cloud computing becomes a successful paradigm for data computing and storage. Increasing concerns about data security and privacy in the cloud, however, have emerged. Ensuring security and privacy for data management and query processing in the cloud is critical for better and broader uses of the cloud. This tutorial covers some common cloud security and privacy threats and the relevant researc...
BACKGROUND Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. OBJECTIVE The aim of this study was to describe nati...
There are many distributed and centralized data mining techniques often used for various applications. Privacy and security issues of these techniques are recently investigated with a conclusion that they reveal information or data to each other clients involved to find global valid results. But because of privacy issues, involving clients do not want to share such type of data. Recently many c...
vehicle safety communications protocols security and privacy vehicle safety communications security bme-hit vehicle safety communications protocols security and security and privacy for a connected vehicle environment surveillance, privacy and the ethics of vehicle safety surveillance, privacy and the ethics of vehicle safety personal information and the design of vehicle safety vehicle safety ...
H ow do we realistically assess the past, present, and future of our security and privacy technology? Like Spider-Man, with our great computing power comes great responsibility—to use our power wisely, to design high-quality security and privacy applications, and to quickly correct errors and improve results. The difficulty of predicting the future of security and privacy is often accompanied b...
This study investigates the composition of consumer’s security and privacy perceptions of mobile commerce (m-commerce) and the factors shaping these security and privacy perceptions. Based on literature review, we examined the effect of eight determinants: information type, information collection, secondary use of information, error, unauthorized access, location awareness, information transfer...
Social web has changed the concept of leisure time. As a result street neighbors have been replaced by e-neighbors and walls have become e-walls to share ideas and gossips. Despite so many advantages we cannot ignore potential threats to user privacy and security. In order to be extremely usable, such systems should have strict security and privacy policies in place. In this paper the authors f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید