Data protection - Security: Data security - The key to privacy

被引:1
|
作者
Carey, Peter
Berry, David
机构
来源
Computer Law and Security Report | 2002年 / 18卷 / 02期
关键词
D O I
10.1016/S0267-3649(02)03010-8
中图分类号
学科分类号
摘要
引用
收藏
页码:112 / 113
相关论文
共 50 条
  • [21] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    IBM Journal of Research and Development, 2009, 53 (02):
  • [22] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [23] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292
  • [24] Secure data encryption key scenario for protecting private data security and privacy
    Mandal, Sanjeev Kumar
    Sharma, Amit
    Henge, Santosh Kumar
    Bashir, Sumaira
    Shukla, Madhuresh
    Pathak, Asim Tara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 269 - 281
  • [25] Data Security and Privacy using Data Partition and Centric key management in Cloud
    Patel, Krunal
    Kumar, Sendhil K. S.
    Singh, Navneet
    Parikh, Kushang
    Jaisankar, N.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [26] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [27] Key security measures for personal data protection in IT systems
    Jankovic, Dejan Z.
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 79 - 82
  • [28] Research on the Key Technologies of Big Data Security and Privacy Protection in the Field Based on Artificial Intelligence
    Ma, Tianyi
    Zhang, Ziyang
    PROCEEDINGS OF THE WORLD CONFERENCE ON INTELLIGENT AND 3-D TECHNOLOGIES, WCI3DT 2022, 2023, 323 : 65 - 77
  • [29] Key Technologies of Data Security and Privacy Protection in the Internet-of-Things Group Intelligence Perception
    Wu, Hao
    Bhola, Jyoti
    Neware, Rahul
    Eswaran, Sathyapriya
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2023, 16 (02) : 135 - 142
  • [30] REGULATING DATA PRIVACY AND USE: A KEY TO MODERN NATIONAL SECURITY?
    Zwier, David
    UNIVERSITY OF PITTSBURGH LAW REVIEW, 2019, 81 (02) : 499 - 526