• No results found

Security and privacy taxonomy for eHealth clouds

Privacy and security in the clouds: IT security and privacy standards in the EU and US

Privacy and security in the clouds: IT security and privacy standards in the EU and US

... mobile security and new technologies, such as cloud computing, were strongly considered, and that helped the standard to improve ...cloud security either as a complement to existing standards, compensating ...

98

Security and privacy in eHealth: is it possible? A sociotechnical analysis

Security and privacy in eHealth: is it possible? A sociotechnical analysis

... In this context, important issues concerning SEHR systems includes such matters as who owns or controls the records or where the ultimate legal responsibility for information privacy resides. The development of an ...

7

ANALYSIS OF SECURITY AND PRIVACY FEATURES IN MAPREDUCE ON CLOUDS

ANALYSIS OF SECURITY AND PRIVACY FEATURES IN MAPREDUCE ON CLOUDS

... networks. Privacy and security of data and MapReduce computations are significant concerns when a MapReduce computation is implements in public or hybrid ...public clouds, authentication of ...

7

ACO: RISK MANAGEMENT AND MITIGATION. ABA ehealth Privacy and Security Interest Group

ACO: RISK MANAGEMENT AND MITIGATION. ABA ehealth Privacy and Security Interest Group

... end security stance that combines network and endpoint security will enable you to capture intelligence from each host or device, which can be assessed in the context of the network layer, providing for ...

77

Privacy-preserving Data Management in eHealth Systems

Privacy-preserving Data Management in eHealth Systems

... 3. Privacy-preserving protocols This section describes in detail protocols for handling caregiver’s requests for accessing patient data in the base stations and for contacting a caregiver in case of emergency ...

8

Patients, trust and ethics in information privacy in eHealth

Patients, trust and ethics in information privacy in eHealth

... However, to be able to practically understand and follow some of the advice given is likely to need someone with some technical knowledge. For example, the explanation of what is counted as personal information is very ...

25

A Formal Taxonomy of Privacy in Voting Protocols

A Formal Taxonomy of Privacy in Voting Protocols

... However the design of protocols to fulfill the high require- ments in electronic voting is notoriously difficult and error- prone. To avoid bugs and analyze protocols, formal verification methods are an ideal tool and ...

8

A Taxonomy for Web Site Privacy Requirements

A Taxonomy for Web Site Privacy Requirements

... effective privacy evaluation mechanism would be a policy-rating tool that considers not only the presence of certain policy content, but the implications of the policy content in reference to how such practices ...

33

A formal taxonomy of privacy in voting protocols

A formal taxonomy of privacy in voting protocols

... • Coercion-Resistance: Even when a voter interacts with a coercer during the entire voting process, the coercer cannot be sure whether he followed his instructions or actually voted for another candidate. However the ...

30

Semantic generation of clouds privacy policies

Semantic generation of clouds privacy policies

... to security concerns for public and private clouds; such as infrastructure integrity and access control (typically authentication and authorization), this does not naturally extend to cover privacy ...

16

Privacy-enhanced keyword search in clouds

Privacy-enhanced keyword search in clouds

... The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data ...

7

Privacy Please:  A Privacy Curriculum Taxonomy (PCT) For The Era Of Personal Intelligence

Privacy Please: A Privacy Curriculum Taxonomy (PCT) For The Era Of Personal Intelligence

... national security by employing the right people and using the latest technology to provide America's leaders with the critical information they need to save lives, defend democracy, and promote American ...

14

Taxonomy for Privacy Policies of Social Networks Sites

Taxonomy for Privacy Policies of Social Networks Sites

... its privacy policies and security measures and privacy tools, trying to get users confidence in using the ...The privacy tools is one of the features that contribute to maintaining the ...

8

Multilateral Privacy in Clouds: Requirements for Use in Industry

Multilateral Privacy in Clouds: Requirements for Use in Industry

... meet security standards are integrated into cloud subnets, they can offer transparent and well documented IT to the cloud users that ...with privacy legislation, they can furthermore be offered in an SaaS ...

8

Cryptography Challenges for Computational Privacy in Public Clouds

Cryptography Challenges for Computational Privacy in Public Clouds

... 2) Integrity: The property is inspired from classic com- munication security. The unit of communication is packet for which integrity can be defined and verified. In Cloud Computing setup this gets tricky, since ...

5

Privacy Preserving Fingerprint Authentication at the Cloud Server for eHealth Services

Privacy Preserving Fingerprint Authentication at the Cloud Server for eHealth Services

... Because of the prevalence of networking and Internet usages, the volume of information being share communicated through communication channels is huge. There are also significant number of security attacks on the ...

5

A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration

A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration

... 22. Solanas, A., Martinez-Balleste, A., Mateo-Sanz, J.: Distributed architecture with double-phase microaggregation for the private sharing of biomedical data in mobile health. IEEE Transactions onInformation Forensics ...

14

Security Framework for Governmental Clouds

Security Framework for Governmental Clouds

... Wyld [35] examines non-military uses of Cloud computing in governments across the globe (Unites States, Europe and Asia), which builds the basis of his proposed 6-step “Cloud Migration Strategy” for governmental agencies ...

40

Proactive Security Auditing for Clouds

Proactive Security Auditing for Clouds

... our auditing approach is signature-based and hence, cannot detect any zero-day security viola- tions. Potentially, an anomaly-based or hybrid (i.e., combining signature and anomaly based) auditing approach may ...

186

PA ehealth Collaborative. Legal, Privacy & Security Committee. September 16, 2011

PA ehealth Collaborative. Legal, Privacy & Security Committee. September 16, 2011

... The Chair appointment by the Advisory Committee has not yet been made. Other committees are working through charter deliverables and recommendations. We are coordinating internally on overlapping issues. The Evaluation & ...

11

Show all 10000 documents...

Related subjects