Spelling suggestions: "subject:"[een] DATA PROTECTION"" "subject:"[enn] DATA PROTECTION""
41 |
A new model for computer network security risk analysis /Martel, Sophie, January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2002. / Includes bibliographical references (p. 167-172). Also available in electronic format on the Internet.
|
42 |
Hardware & software codesign of a JPEG200 watermarking encoderMendoza, Jose Antonio. Kougianos, Elias, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
43 |
Region aware DCT domain invisible robust blind watermarking for color imagesNaraharisetti, Sahasan. Mohanty, Saraju, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
44 |
A socio-technical perspective on information security knowledge and attitudes /Long, Cheri Lanette, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 210-223). Available also in a digital version from Dissertation Abstracts.
|
45 |
Preserving privacy with user-controlled sharing of verified informationBauer, David Allen. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
46 |
Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
|
47 |
HDT crypt: Compression and Encryption of RDF DatasetsFernandez Garcia, Javier David, Kirrane, Sabrina, Polleres, Axel, Steyskal, Simon January 2018 (has links) (PDF)
The publication and interchange of RDF datasets online has experienced significant growth in recent years, promoted by different but complementary efforts, such as Linked Open Data, the Web of Things and RDF stream processing systems. However, the current Linked Data infrastructure does not cater for the storage and exchange of sensitive or private data. On the one hand, data publishers need means to limit access to confidential data (e.g. health, financial, personal, or other sensitive data). On the other hand, the infrastructure needs to compress RDF graphs in a manner that minimises the amount of data that is both stored and transferred over the wire. In this paper, we demonstrate how HDT - a compressed serialization format for RDF - can be extended to cater for supporting encryption. We propose a number of different graph partitioning strategies and discuss the benefits and tradeoffs of each approach.
|
48 |
Obecné nařízení o ochraně osobních údajů: výzvy pro cloud / General Data Protection Regulation: Challenges for the CloudStudihradová, Barbora January 2018 (has links)
1 CHARLES UNIVERSITY IN PRAGUE Faculty of Law Barbora Studihradová General Data Protection Regulation: Challenges for the Cloud Master's thesis Master's thesis supervisor: JUDr. Magdaléna Svobodová, Ph.D. Department of European Law Date of completion (manuscript closure): 13 April 2018 2 General Data Protection Regulation: Challenges for the Cloud Abstract This thesis recognizes and analyses some of the fundamental challenges that the General Data Protection Regulation poses for cloud computing. Its aim is to answer the question whether the GDPR can be regarded as cloud friendly. The hypothesis that is proposed and tested is that it cannot be, since it includes concepts and wording that are impractical in cloud computing. This is assessed based on how different cloud computing services function. The thesis therefore lays down foundations of both legal and technical understanding of the data protection in the cloud in the first chapters. The analysis of the challenges then builds on this knowledge. The challenges of the GDPR for the cloud are divided into five groups. Firstly, what is regulated as personal data in the cloud is consider with regard to the concepts of anonymisation, pseudonymisation and encryption. Secondly, controller - processor relationship and their obligations in the complex cloud...
|
49 |
Customer ratings as a vector for discrimination in employment relations? Pathways and pitfalls for legal remediesKullmann-Klocke, Miriam, Ducato, Rossana, Rocca, Marco 18 March 2018 (has links) (PDF)
The use of customer ratings to evaluate worker performance is increasingly worrisome because of its widespread use in the gig-economy. As scholars in computer and social sciences denounce, this practice entails the risk of producing discriminatory outcomes, by reproducing biases existing in society. By drawing an analogy with discriminatory practices adopted by an employer to satisfy its customers' preferences, we propose a legal analysis of this phenomenon grounded in EU non-discrimination law. Thus, we first analyse the issues related to the application of non-discrimination law to (alleged) self-employed workers. Then, we address the lack of access for the individual worker to the data regarding customers' ratings. We conclude by arguing that the use of customer ratings should be considered as a suspect criterion, while the current (EU) non-discrimination laws should be modernised through a clearer inclusion of (alleged) self-employed workers. / Series: ohne Reihe
|
50 |
Automated secure systems development methodologyBooysen, Hester Aletta Susanna 20 November 2014 (has links)
D.Com. (Informatics) / The complexity of modern computer-based information systems is such that, for all but the simplest of examples, they cannot be produced without a considerable amount of prior planning and preparation. The actual difficulties of trying to design, develop and implement complex computer-based systems have been recognised as early as the seventies. In a bid to deal with what was then referred to as the "software crisis", a number of so- called "methodologies" were advocated. Those methodologies were, in turn, based on a collection of guidelines or methods thanks to which their designers could eventually make the claim that computer systems, and in particular information systems, could be designed and developed with a greater degree of success. By using a clear set of rules, or at least reasonably detailed principles, they could ensure that the various design and development tasks be performed in a methodical, organ ised fashion. Irrespective of the methodologies or guidelines that were adopted or laid down, the developers principal aim was to ensure that all relevant detail about the proposed information systems would be taken into account during the long and often drawn-out design and development process. Unfortunately, many of those methodologies and guidelines date from the early 1970s and, as a result, no longer meet the security requirements and guidelines of today's information systems. It was never attempted under any of those methodolog ies, however, to unriddle the difficulties they had come up against in information security in the domain of system development . Security concerns should however, form an integral part of the planning, development and maintenance of a computer application. Each application system should for example, take the necessary security measures in any given situation.
|
Page generated in 0.0272 seconds