Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Data security" wg kryterium: Temat


Tytuł:
Raising public and private user awareness of the threats and risks related to cyberspace security
Autorzy:
Makuch, Anna
Powiązania:
https://bibliotekanauki.pl/articles/2158436.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state security
cyberspace
data security
Opis:
Modern cybersecurity efforts require the identification ofthe risks and threats associated with the cyberenvironment by consistently increasing public awareness of the dual nature of cyberspace and its use for the purposes of cooperation, and for the purposes of warfare and crime. Raising awareness today means involving both public and private users in cooperationfor the sake of both the common good and common interests involving standards for the use of virtual space.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 44-55
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data security based on neural networks
Autorzy:
Noaman, K.M.G.
Jalab, H.A.
Powiązania:
https://bibliotekanauki.pl/articles/1964155.pdf
Data publikacji:
2005
Wydawca:
Politechnika Gdańska
Tematy:
data security
cryptography
neural networks
Opis:
The paper is concerned with the study and design of a data security system based on neural networks. Data with different keys were taken as test data, encrypted, decrypted and compared with the original data. The results have confirmed its advantages over other techniques.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2005, 9, 4; 409-414
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
Autorzy:
Hłobaż, Artur
Powiązania:
https://bibliotekanauki.pl/articles/2055243.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
secure communication
data encryption
data security
secure transmission
secure data exchange method
SDEx method
end-to-end data security
Opis:
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 1; 57--62
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Association Rule Mining-Based Data Sanitization for Privacy Preservation Model in Cloud
Autorzy:
Patil, Rajkumar
HimaBindu, Gottumukkala
Powiązania:
https://bibliotekanauki.pl/articles/2200962.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data security
improved apriori
modified data restoration
sanitization
Opis:
Data security in cloud services is achieved by imposing a broad range of privacy settings and restrictions. However, the different security techniques used fail to eliminate the hazard of serious data leakage, information loss and other vulnerabilities. Therefore, better security policy requirements are necessary to ensure acceptable data protection levels in the cloud. The two procedures presented in this paper are intended to build a new cloud data security method. Here, sensitive data stored in big datasets is protected from abuse via the data sanitization procedure relying on an improved apriori approach to clean the data. The main objective in this case is to generate a key using an optimization technique known as Corona-integrated Archimedes Optimization with Tent Map Estimation (CIAO-TME). Such a technique deals with both restoration and sanitization of data. The problem of optimizing the data preservation ratio (IPR), the hiding ratio (HR), and the degree of modification (DOM) is formulated and researched as well.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 51--59
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Distributed social network - data security
Autorzy:
Tunia, M. A.
Powiązania:
https://bibliotekanauki.pl/articles/106200.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
social network
data security
data repository
system architecture
interface
Opis:
The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can become. Users’ personal data can constitute significant value. One of the issues of social networking is storing and processing data by only one entity. Users cannot choose the most suitable security policy because there is only one provided for certain social network. Being part of it, means accepting the risk of unauthorized data distribution and data leakage because of application vulnerabilities. This paper presents new architecture of social network, which provides mechanisms for dividing data between more than one entity and combining independent data repositories in order to deliver one social network with clearly defined interfaces used to connect new data sources.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 113-122
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Issues of personal data management in organizations – GDPR compliance level analysis
Autorzy:
Kucęba, Robert
Chmielarz, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/432163.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
personal data
personal data protection
personal data security breaches
GDPR
Opis:
The paper presents the issues of information and personal data security management in organizations. The authors include in it an analysis of breaches to personal data security in organizations as a vital factor that conditions the necessity to improve the previously applied solutions in this area. Additionally, the paper contains analyses concerning the preparation level of organizations to ensure compliance with the General Data Protection Regulation (GDPR) which is coming into force. The paper constitutes a cognitive query in the scope of the subject matter defined in its title
Źródło:
Informatyka Ekonomiczna; 2018, 1(47); 58-71
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Attitudes of young consumers on the security of their data collected by smart devices in the age of the internet of things
Autorzy:
Kolny, Beata
Powiązania:
https://bibliotekanauki.pl/articles/11052270.pdf
Data publikacji:
2021-09-30
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Lotnictwa
Tematy:
Internet of Things
smart devices
data security
consumers
Opis:
The popularity of smart devices that collect and share data on user behaviour grows every year, and the number of such devices in households is forecast to rise steadily. Therefore, the purpose of this paper is to present the attitudes of young consumers regarding the security of their data collected by smart devices, interconnected via the existing Internet infrastructure or other network technologies within the Internet of Things (IoT) systems. The paper was written based on both secondary and primary sources of information. Secondary sources were used to define the discussed issues related to the Internet of Things and the security of data collected by smart devices. Primary sources, on the other hand, offered direct evidence of the attitudes of young consumers on the security of such data. Direct research was carried out using an online survey carried out in 2021 on a sample of 588 consumers aged 18–34 living in Poland. The results show that more than half of the respondents pay great attention to where the data collected by the devices used in their households is kept and whether such data is safe. In spite of such declarations, more than half of those surveyed have no knowledge about the level of the security of such data. The respondents agreed with the statement that consumers accepted the uncertainty related to the loss of control over their personal data collected by smart devices more quickly than the risk involved in becoming disconnected from them.
Źródło:
Marketing Instytucji Naukowych i Badawczych; 2021, 41, 3; 21-38
2353-8414
Pojawia się w:
Marketing Instytucji Naukowych i Badawczych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security mechanisms for data access in aspects of tools available in .net framework
Autorzy:
Michalska, A.
Poniszewska-Maranda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94847.pdf
Data publikacji:
2014
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
Security Mechanisms
data security
data access
mechanizmy zabezpieczające
bezpieczeństwo danych
dostęp do danych
Opis:
Software solutions are nowadays commonly used in business. More and more transactions are conducted on-line as well as more and more critical information is being kept on local or remote servers in huge databases. The purpose of presented paper is to analyze and propose the solutions used for the security of sensitive personal data and access to such data provided by the platform chosen for research with respect to the real-life needs of the developers and end-users. The main focus are put on the solutions provided by the .NET platform which next to Java is one of the most commonly used programming environments for both web page and desktop applications.
Źródło:
Information Systems in Management; 2014, 3, 3; 170-181
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zastosowanie klastra wysokiej dostępności w bezpieczeństwie relacyjnych baz danych
Application of high availability cluster for security of relational databases
Autorzy:
Berski, S.
Szatan, R.
Powiązania:
https://bibliotekanauki.pl/articles/103657.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
bezpieczeństwo danych
replikacja danych
bazy danych
data security
data replication
databases
Opis:
W pracy zaproponowano mechanizm zapewniania bezpieczeństwa danych poddanych zagrożeniom wynikającym z awarii systemu komputerowego lub sprzętu komputerowego. Przedstawione w pracy rozwiązanie polega na uruchomieniu klastra wysokiej dostępności dla bazy danych środków trwałych Instytutu Przeróbki Plastycznej i Inżynierii Bezpieczeństwa opartego o narzędzie do replikacji danych oraz narzędzie do kontroli dostępności poszczególnych węzłów klastra. W pracy zastosowano DRBD - narzędzie do replikacji urządzeń blokowych, które działa jako moduł jądra służący do mirrorowania systemów plików przez sieć [6]. DRBD umożliwia ochronę danych komputerowych poprzez zapis lustrzany w pamięciach dyskowych. Polega to na dublowaniu zapisu danych, w wyniku czego dwa urządzenia przechowują taką samą informację. Jako narzędzia kontroli dostępności poszczególnych węzłów klastra w pracy użyto z kolei systemu Heartbeat, który sprawdza operacje wejścia-wyjścia w celu zapewnienia spójności danych, a następnie przenosi zasoby na alternatywny węzeł [5].
In the work the security system of data subjected to risks arising from the failure of a computer system or computer equipment was presented. The analyzed solution is based on creation of high-availability cluster for database of fixed assets in Institute of Metal Forming and Safety Engineering. The proposed security system is based on DRBD software, replicated storage solution mirroring the content of hard disks, partitions, logical volumes etc. between hosts connected via Ethernet [6]. DRBD enables replication of selected services like MySQL server or http server to ensure mirroring of data managed by these servers. The Heartbeat service was used in the analyzed solution as a tool to control availability of the several nodes of the cluster to check the input– output operations and decides when to transfer the selected resources to satellite node [5].
Źródło:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa; 2016, T. 4; 49-57
2300-5343
Pojawia się w:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploration of a fragmented discourse. Privacy and data security in Süddeutsche Zeitung: 2007–2017
Autorzy:
Meissner, Florian
von Nordheim, Gerret
Powiązania:
https://bibliotekanauki.pl/articles/691344.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, digitization, privacy, data security, information security, surveillance, Snowden, risk communication, journalism.
Opis:
The goal of this exploratory case study is to identify different facets of news reporting on surveillance, privacy and data security, and more specifically, how risks in this context are portrayed. The theoretical foundation consists of two elements: 1) the concept of mediatized risk culture, and 2) the discursive arena model of risk communication, which provides the normative background for assessing news reporting. A text-mining approach (topic modeling) is applied to analyze relevant coverage of the German quality newspaper Süddeutsche Zeitung. The study yields a total of seven topics which belong to three categories: violation of privacy norms, power and law enforcement, and datafication. The results show that despite the de-mystification of digital technology after the Snowden leaks, coverage has recently become more affirmative and less focused on risk. We conclude that this may indicate a normalization of mass surveillance and data harvesting even in Germany, a society which traditionally values privacy. In order to add more context to our findings, however, further qualitative analyses were needed. The paper serves as a starting point for further research on media reporting of surveillance, privacy and data security.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Chmura obliczeniowa dla logistyki – projekt LOGICAL
Architecture of computing cloud – LOGICAL project
Autorzy:
Korczak, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/432039.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
cloud computing architecture
logistic services
cloud portal
data security
Opis:
This paper describes the organization of the local cloud computing environment at the University of Leipzig and Wrocław University of Economics, developed in the framework of the LOGICAL research project. In particular, the architecture of the main components of the cloud portal are described as well as their references to VMWare software. An example of logistics application – LogBase on Demand − is shortly presented.
Źródło:
Informatyka Ekonomiczna; 2014, 2(32); 95-105
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling of the User’s Identification Security System of on the 2FA Base
Autorzy:
Ussatova, Olga
Nyssanbayeva, Saule
Wójcik, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/1844625.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
two-factor authentication
data security
user identification
password generator
Opis:
The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 235-240
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improving Quality of Watermarked Medical Images Using Symmetric Dilated Convolution Neural Networks
Autorzy:
Pulgam, Namita D.
Shinde, Subhash K.
Powiązania:
https://bibliotekanauki.pl/articles/24200734.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data security
denoising
digital watermarking
image processing
medical imaging
Opis:
Rapid development of online medical technologies raises questions about the security of the patient’s medical data.When patient records are encrypted and labeled with a watermark, they may be exchanged securely online. In order to avoid geometrical attacks aiming to steal the information, image quality must be maintained and patient data must be appropriately extracted from the encoded image. To ensure that watermarked images are more resistant to attacks (e.g. additive noise or geometric attacks), different watermarking methods have been invented in the past. Additive noise causes visual distortion and render the potentially harmful diseases more difficult to diagnose and analyze. Consequently, denoising is an important pre-processing method for obtaining superior outcomes in terms of clarity and noise reduction and allows to improve the quality of damaged medical images. Therefore, various publications have been studied to understand the denoising methods used to improve image quality. The findings indicate that deep learning and neural networks have recently contributed considerably to the advancement of image processing techniques. Consequently, a system has been created that makes use of machine learning to enhance the quality of damaged images and to facilitate the process of identifying specific diseases. Images, damaged in the course of an assault, are denoised using the suggested technique relying on a symmetric dilated convolution neural network. This improves the system’s resilience and establishes a secure environment for the exchange of data while maintaining secrecy.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 2; 46--52
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Narzędzia i technologie ochrony danych
Tools and technologies data protection
Autorzy:
Staniewska, E.
Żywiołek, J.
Powiązania:
https://bibliotekanauki.pl/articles/103439.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
bezpieczeństwo danych
narzędzia ochrony danych
data security
information protection tools
Opis:
Informacja jako największe dobro każdej instytucji powinna podlegać ochronie przed niepowołanym dostępem, zniszczeniem lub nieautoryzowaną zmianą. W artykule przedstawiono wybrane aspekty bezpieczeństwa, a w szczególności typy zagrożeń oraz metody ochrony danych.
Information as the greatest good of each institution should be protected from unauthorized access, destruction, or unauthorized modification. The paper presents selected aspects of security, in particular the types of threats and methods of data protection.
Źródło:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa; 2013, T. 1; 307-317
2300-5343
Pojawia się w:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies