Data protection - Security: Data security - The key to privacy

被引:1
|
作者
Carey, Peter
Berry, David
机构
来源
Computer Law and Security Report | 2002年 / 18卷 / 02期
关键词
D O I
10.1016/S0267-3649(02)03010-8
中图分类号
学科分类号
摘要
引用
收藏
页码:112 / 113
相关论文
共 50 条
  • [41] Security and privacy in big data
    Xiang, Yang
    Au, Man Ho
    Kutylowsky, Miroslaw
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2856 - 2857
  • [42] Data Provenance in Security and Privacy
    Pan, Bofeng
    Stakhanova, Natalia
    Ray, Suprio
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [43] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [44] Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection
    Shariati, S. Mandi
    Abouzarjomehri
    Ahmadzadegan, M. Hossein
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1078 - 1082
  • [45] Retraction Note: Research on key technologies of data security and privacy protection in internet of things group intelligence
    Yadong Liu
    Yahui Hua
    Qingrong Chen
    Optical and Quantum Electronics, 56 (10)
  • [46] Key Technologies and Methods for Vector Geographic Data Security Protection
    Li H.
    Zhu H.
    Hua W.
    Shang H.
    Liu H.
    Li G.
    Yang F.
    Song J.
    Diqiu Kexue - Zhongguo Dizhi Daxue Xuebao/Earth Science - Journal of China University of Geosciences, 2020, 45 (12): : 4574 - 4588
  • [47] Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy
    Labib, Nader S.
    Brust, Matthias R.
    Danoy, Gregoire
    Bouvry, Pascal
    2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [48] Based on the Technological Analysis of Big Data Security and Privacy Protection Technology
    Wang, Lei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY (EMCS 2017), 2017, 61 : 603 - 606
  • [49] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [50] Privacy and security data-sharing technologies for tampering protection and detection
    Buddhika Harshanath S.M.
    IEIE Transactions on Smart Processing and Computing, 2019, 8 (01): : 43 - 48