Court case to reclaim confidential data

被引:0
|
作者
Jim Giles
机构
来源
Nature | 2007年 / 446卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Prosecution highlights how drug data can be removed from public view.
引用
收藏
页码:838 / 839
页数:1
相关论文
共 50 条
  • [1] Court case to reclaim confidential data
    Giles, Jim
    NATURE, 2007, 446 (7138) : 838 - 839
  • [2] COURT CONFIDENTIAL
    JEREMIAH JENNE
    The World of Chinese, 2017, (06) : 33 - 35
  • [3] COURT UPHOLDS EXCHANGE AGREEMENTS LIMIT ON DISCLOSURE OF CONFIDENTIAL DATA
    MORSE, HN
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1980, 25 (04): : 82 - &
  • [4] 3400 ORGANIZATIONS REQUIRED BY COURT ORDER TO FURNISH CONFIDENTIAL DATA TO IBM
    DAVIDSON, L
    FRENCH, JD
    NEVILLE, P
    CARPENTE.NR
    COMPUTERS AND AUTOMATION, 1972, 21 (02): : 21 - &
  • [5] 3400 ORGANIZATIONS REQUIRED BY COURT ORDER TO FURNISH CONFIDENTIAL DATA TO IBM .2.
    SPRAGUE, RE
    CARPENTE.NR
    COMPUTERS AND AUTOMATION, 1972, 21 (03): : 19 - &
  • [6] PROTECTION OF CONFIDENTIAL DATA
    GALLOUEDECGENUYS, F
    OECD INFORMATICS STUDIES, 1976, (M10): : 227 - 242
  • [7] Improving the Confidential Data Totalization
    Furukawa, Kazuyoshi
    Takenaka, Masahiko
    Izu, Tetsuya
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 826 - 830
  • [8] Monitoring Leaked Confidential Data
    Trabelsi, Slim
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [9] Secure contexts for confidential data
    Bossi, A
    Macedonio, D
    Piazza, C
    Rossi, S
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 14 - 28
  • [10] Confidential trust information and court proceedings: can privacy be maintained?
    Sawyer, Edward
    Holmes, Jamie
    TRUSTS & TRUSTEES, 2020, 26 (04) : 319 - 335