Personal Data in Cyber Systems Security

被引:0
|
作者
Ogiela, Marek R. [1 ]
Ogiela, Lidia [2 ]
机构
[1] AGH Univ Sci & Technol, Fac Elect Engn Automat Comp Sci & Biomed Engn, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
[2] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
关键词
D O I
10.1007/978-3-319-61566-0_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper will be presented the ways of using personal information for security purposes and applications. In particular several different approaches will be described, which present application of personal biometric features, as well as behavioral patterns characteristic for particular users. Both behavioral and biometrics pattern can be extracted thanks to the application of new generation cognitive information systems. Obtained personal feature vectors, can be used in many security application, as well as in personalized cryptographic protocols. Such solutions will be described in this paper.
引用
收藏
页码:174 / 180
页数:7
相关论文
共 50 条
  • [1] CYBER (IN)SECURITY OF PERSONAL DATA AND INFORMATION IN TIMES OF DIGITIZATION
    Dvojmoc, Miha
    Verboten, Mojca Tancer
    [J]. MEDICINE LAW & SOCIETY, 2022, 15 (02): : 287 - 304
  • [2] CYBER SECURITY AWARENESS OF CROATIAN STUDENTS AND THE PERSONAL DATA PROTECTION
    Papic, Anita
    Radoja, Katarina Knol
    Szombathelyi, Donata
    [J]. 11TH INTERNATIONAL SCIENTIFIC SYMPOSIUM REGION, ENTREPRENEURSHIP, DEVELOPMENT (RED 2022), 2022, : 563 - 574
  • [3] Big Data In computer Cyber Security Systems
    AlMadahkah, Amani Mobarak
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 56 - 65
  • [4] On the scalability of Big Data Cyber Security Analytics systems
    Ullah, Faheem
    Babar, M. Ali
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198
  • [5] Innovative Protocols for Data Sharing and Cyber Systems Security
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 445 - 452
  • [6] Cyber Security and Data Collection Approaches for Smartphone Sensor Systems
    Turner, Hamilton
    White, Jules
    [J]. GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR III, 2012, 8389
  • [7] Personal Data Management Systems: The security and functionality standpoint
    Anciaux, Nicolas
    Bonnet, Philippe
    Bouganim, Luc
    Nguyen, Benjamin
    Pucheral, Philippe
    Popa, Lulian Sandu
    Scerri, Guillaume
    [J]. INFORMATION SYSTEMS, 2019, 80 : 13 - 35
  • [8] Key security measures for personal data protection in IT systems
    Jankovic, Dejan Z.
    [J]. 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 79 - 82
  • [9] Data mining and Cyber security
    Thuraisingham, B
    [J]. THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
  • [10] CYBER SECURITY AND DATA VISUALISATION
    Azvine, Ben
    Ghanea-Hercack, Robert
    [J]. JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2016, 10 : 9 - 13