• No results found

sensitive information

The Cryptography Based Security Algorithm For Protecting  Sensitive Information In Cloud Environment

The Cryptography Based Security Algorithm For Protecting Sensitive Information In Cloud Environment

... ABSTRACT : Data security has congruently been a significant issue in information technology. In the cloud computing , it becomes especially imporantt because the data is stored in different places around the ...

7

Blockchain based Secure Data Sharing and Sensitive Information Hiding in Cloud Storage Environment

Blockchain based Secure Data Sharing and Sensitive Information Hiding in Cloud Storage Environment

... based sensitive information hiding achieves more security compared to traditional system of data ...the sensitive information is stored in a centralized database so if an attacker attacks the ...

7

Protecting the Sensitive Information on Online Social Networks

Protecting the Sensitive Information on Online Social Networks

... statistical information that does not make threats ...about sensitive labels, while ensuring that the identification of users are protected from privacy ...out sensitive information based on ...

6

Design and Implementation of Sensitive Information Security Model based on Term Clustering

Design and Implementation of Sensitive Information Security Model based on Term Clustering

... and information securely and frequently via Internet is very common and demanded in today‟s fast track scenario of ...proposed Sensitive Information Security Model Based on Term Clustering (SIS-TC) ...

6

Preserving Sensitive Information using Fuzzy C Means Approach

Preserving Sensitive Information using Fuzzy C Means Approach

... combining information from multiple sources like sample movies, images, clinical data, proteomics, scientific knowledge, by providing support for differential diagnosis and providing patient-specific prognosis ...

7

Title: Protected Framework for Securing Sensitive Information from Unauthorized Users

Title: Protected Framework for Securing Sensitive Information from Unauthorized Users

... authorized information is available to users The sensitive information which is the user is not authorized to access will not accessed by the ...example, sensitive information such as ...

6

Collecting Sensitive Information from Windows Physical Memory

Collecting Sensitive Information from Windows Physical Memory

... find sensitive information such as userID and ...Unfortunately, sensitive information can not be found on the hard drive in most ...Consequently, sensitive information needs to ...

8

A Survey of Sensitive Information Hiding Techniques

A Survey of Sensitive Information Hiding Techniques

... all sensitive patterns in the group will be hidden in one ...for sensitive rules at certain level while ensuring data ...the sensitive association rules based on ...

5

Culturally-Sensitive Information-Sharing in Pediatric Palliative Care

Culturally-Sensitive Information-Sharing in Pediatric Palliative Care

... studies did not include descriptions of parents’ receiving no information. Parents in our study who spoke little or no English told several stories about receiving no information, basic infor- mation ...

9

Protect sensitive information against channel state information based attacks

Protect sensitive information against channel state information based attacks

... As a departure from prior work that all consider the channel interferences as a harmful effect and make every effort to prevent it from happening [5], [6], [7], [8], [9], our approach carefully utilizes the interference ...

10

Cloud Computing: Data Storage Security Analysis and its Challenges

Cloud Computing: Data Storage Security Analysis and its Challenges

... of sensitive information which include personal identification information, unauthorized access to personal data, protect privacy of data when moving outside the organization ...auxiliary ...

5

Combined Access Control of Time and Attributes for Time Sensitive Data in Cloud

Combined Access Control of Time and Attributes for Time Sensitive Data in Cloud

... In this paper, we suggested a strategy to complete the goal. Our strategy continually merges the suggestion of intended discharge encryption to the layout of cipher message strategy top quality based encryption. With a ...

5

JOINT OIREACHTAS COMMITTEE ON FINANCE, PUBLIC EXPENDITURE AND REFORM 24th October 2012 : Opening address by NAMA Chief Executive, Mr  Brendan McDonagh

JOINT OIREACHTAS COMMITTEE ON FINANCE, PUBLIC EXPENDITURE AND REFORM 24th October 2012 : Opening address by NAMA Chief Executive, Mr Brendan McDonagh

... commercially sensitive information in the public domain but they would benefit greatly from any similarly sensitive information that NAMA was required to disclose, as indeed would potential ...

9

Title: Sanitization Techniques for Protecting Social Networks from Inference Attacks

Title: Sanitization Techniques for Protecting Social Networks from Inference Attacks

... This section provides review of literature on prior works. In [5] attacks are explored on anonymized networks. The goal of such attacks was to know the identity of people. In [7] many anonymizing techniques were ...

9

Transcribed Speech of Dr. Arthur Derse

Transcribed Speech of Dr. Arthur Derse

... But nonetheless, there are some sensitive information concerns in the doctor-patient relationship and as the pay-for- performance is measured, it's possible that if [r] ...

5

Privacy Aware Text Rewriting

Privacy Aware Text Rewriting

... structured sensitive attributes such as age and gen- der, such sensitive information can still be pre- dicted from unstructured text data (Blodgett et ...more sensitive information in ...

11

3034 pdf

3034 pdf

... The Attack CreditReport.htm allows us to view customer data, credit report status, Fraud Information, Declined application status and a multitude of various sensitive information.. By cr[r] ...

47

Network Security in Organizations

Network Security in Organizations

... Network Security is very important because a lot of hackers design mechanism to break the security system and misuse the sensitive information. Network Security in an organization is much important where ...

6

Analysis Of Issues In Phishing Attacks And Development Of Prevention Mechanism

Analysis Of Issues In Phishing Attacks And Development Of Prevention Mechanism

... Phishing is a highly profitable activity for criminals. Over the past two years, there has been an increase in the technology, diversity, and sophistication of these attacks in response to increased user awareness and ...

7

ch13 Emanation

ch13 Emanation

... circuits and equipment used to handle classified or sensitive information. • Classifications[r] ...

26

Show all 10000 documents...

Related subjects