Privacy protection and adding security strength
نویسندگان
چکیده
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملUbiquitous Security: Privacy versus Protection
In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and protection to gain full entry into this new info...
متن کاملAdding privacy protection to policy based authorisation systems
............................................................................................................................................................ i Acknowledgements ........................................................................................................................................ ii Table of
متن کاملData Security and Privacy Protection in Pervasive Computing Environments
The integration of advanced wireless technology and Internet tends to increase connections of computing devices. Because Pervasive Computing environments make people get accustomed to computing, they naturally forget the fact that they are using computers. Furthermore, smart devices around offer them services such as user location information, user situation, and user data maintenance/managemen...
متن کاملData Mining in Security, Surveillance, and Privacy Protection
While literature within the field of privacy-preserving data mining (PPDM) has been around for seven years, understanding the role of privacy in this context is still very much in its infancy. Most of the algorithms and approaches that have been introduced are very ad-hoc, computationally expensive, and do not support a formal theoretical approach similar to those that exist in security or data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Privacy and Security
سال: 2017
ISSN: 1553-6548,2333-696X
DOI: 10.1080/15536548.2017.1357381