نتایج جستجو برای: security and privacy

تعداد نتایج: 16851797  

2015
Chuang Wang Carl K. Chang Yong Guan Daji Qiao Johnny S. Wong

Wireless sensor networks have been widely deployed in many social settings to monitor human activities and urban environment. In these contexts, they acquire and collect sensory data, and collaboratively fuse the data. Due to resource constraint, sensor nodes however cannot perform complex data processing. Hence, cloud-integrated sensor networks have been proposed to leverage the cloud computin...

2014
Michael Friedewald Marc van Lieshout Sven Rung Merel Ooms Jelmer Ypma

This paper considers the relationship between privacy and security and, in particular, the traditional ”trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have often fallen on deaf ears. Based on data gathered in a pan-European survey we show that both privacy ...

Journal: :Software: Practice and Experience 2020

Journal: :IOSR Journal of Computer Engineering 2013

Journal: :Proceedings of the National Academy of Sciences 1997

Journal: :International Journal of Distributed Sensor Networks 2015

Journal: :IJDET 2003
Khalil El-Khatib Larry Korba Yuefei Xu George Yee

For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction on-line. While many advances have been made in the mechanics of providing online instruction, the needs for privacy and security have to-date been largely ignored. At best they have been accommodated in an ad-hoc, patchwork fashion. Privacy can be described as a learner's ability...

2011
Marie Caroline Oetzel Barbara Krumay

Privacy and security are important topics in research and business. This work on one hand offers a way to differentiate these two topics and provides information about different privacy regulations already existing in Europe and the US. We clarify definitions of information privacy and state that privacy and security are not the same, although most companies do not differentiate. A content anal...

Journal: :IJISP 2007
Stephen J. H. Yang Blue C. W. Lan James S. F. Hsieh Jen-Yao Chung

Recent Articles: n Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation n Administering the Semantic Web: Confidentiality, Privacy, and Trust Management n Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication As information technology and the Internet become increasingly pervasive in our daily lives, there is an essential need for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید