Works matching DE "DATA protection research"
Results: 60
PROBLEMY ANONIMIZACJI DOKUMENTÓW MEDYCZNYCH . CZĘŚĆ 2. ANONIMIZACJA ZAAWANSOWANA ORAZ STEROWANA PRZEZ POSIADACZA DANYCH WRAŻLIWYCH.
- Published in:
- Higher School's Pulse, 2014, v. 8, n. 2, p. 13, doi. 10.5604/01.3001.0003.3161
- By:
- Publication type:
- Article
BALANCING THE "CONFIDENTIALITY DUTY" TOWARDS A DECEASED'S GENETIC INFORMATION WITH THE RELATIVES' RIGHT TO HEALTH: A USEFUL COMPARISON BETWEEN ITALIAN AND DUTCH REGULATORY FRAMEWORK.
- Published in:
- Revista Romana de Bioetica, 2014, v. 12, n. 4, p. 24
- By:
- Publication type:
- Article
Reliability and Performance of Mirrored Disk Organizations.
- Published in:
- Computer Journal, 2008, v. 51, n. 6, p. 615, doi. 10.1093/comjnl/bxm079
- By:
- Publication type:
- Article
An unsupervised approach for traffic trace sanitization based on the entropy spaces.
- Published in:
- Telecommunication Systems, 2016, v. 61, n. 3, p. 609, doi. 10.1007/s11235-015-0017-6
- By:
- Publication type:
- Article
„Persoana vizată”, titularul dreptului la protecšia datelor personale: anonimizarea şi pseudonimizarea.
- Published in:
- Review of Juridical Sciences / Revista de Științe Juridice, 2013, v. 23, n. 1, p. 237
- By:
- Publication type:
- Article
The Essence and Definition of Information Support for the Customs.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 77, doi. 10.5604/20805268.1094067
- By:
- Publication type:
- Article
Application of Digital Rights Management in Library.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2014, v. 34, n. 1, p. 11, doi. 10.14429/djlit.34.5490
- By:
- Publication type:
- Article
Consumer-managed profiling: a contemporary interpretation of privacy in buyer-seller interactions.
- Published in:
- Journal of Marketing Management, 2010, v. 26, n. 3-4, p. 321, doi. 10.1080/02672570903566383
- By:
- Publication type:
- Article
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS.
- Published in:
- MIS Quarterly, 2013, v. 37, n. 4, p. 1189
- By:
- Publication type:
- Article
PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES.
- Published in:
- ICTACT Journal on Image & Video Processing, 2015, v. 5, n. 3, p. 991, doi. 10.21917/ijivp.2015.0146
- By:
- Publication type:
- Article
Electronic retention: what does your mobile phone reveal about you?
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 337, doi. 10.1007/s10207-011-0144-3
- By:
- Publication type:
- Article
1:25000 Ölçekli coğrafi veri tabanı tasarımında topografik detaylar arasındaki topolojik ilişkilerin tanımlanması.
- Published in:
- ITU Journal Series D: Engineering, 2010, v. 9, n. 6, p. 51
- By:
- Publication type:
- Article
Information Security Issues in a Digital Library Environment: A Literature Review.
- Published in:
- Information World / Bilgi Dünyası, 2012, v. 13, n. 1, p. 117, doi. 10.15612/bd.2012.171
- By:
- Publication type:
- Article
Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 1, p. 2104, doi. 10.3390/s150102104
- By:
- Publication type:
- Article
Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 1, p. 2021, doi. 10.3390/s150102021
- By:
- Publication type:
- Article
Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 11, p. 21174, doi. 10.3390/s141121174
- By:
- Publication type:
- Article
Secure Information Market: A Model to Support Information Sharing, Data Fusion, Privacy, and Decisions.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 1, p. 269, doi. 10.2308/isys-50705
- By:
- Publication type:
- Article
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 1, p. 209, doi. 10.2308/isys-50704
- By:
- Publication type:
- Article
Data Protection in the Federal Republic of Germany and the European Union: An Unequal Playing Field.
- Published in:
- German Law Journal, 2014, v. 15, n. 3, p. 461, doi. 10.1017/s207183220001899x
- By:
- Publication type:
- Article
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure.
- Published in:
- Information Security Journal: A Global Perspective, 2011, v. 20, n. 2, p. 78, doi. 10.1080/19393555.2011.560922
- By:
- Publication type:
- Article
Investigating Information Security Awareness: Research and Practice Gaps.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 5/6, p. 207, doi. 10.1080/19393550802492487
- By:
- Publication type:
- Article
NMIBAS: A NOVEL MULTI-RECEIVER ID-BASED ANONYMOUS SIGNCRYPTION WITH DECRYPTION FAIRNESS.
- Published in:
- Computing & Informatics, 2013, v. 32, n. 3, p. 441
- By:
- Publication type:
- Article
Neutrality Tests for Sequences with Missing Data.
- Published in:
- Genetics, 2012, v. 191, n. 4, p. 1397, doi. 10.1534/genetics.112.139949
- By:
- Publication type:
- Article
Security and Administrative of Limited Data Servicing in Cloud Computing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 6, p. 61
- By:
- Publication type:
- Article
Image Encryption for Separable Reversible Data Hiding.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 5, p. 230
- By:
- Publication type:
- Article
A Review on Detection of Session Hijacking and Ip Spoofing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 104
- By:
- Publication type:
- Article
Protected Multi-tiered Sensor Network Uses Spatiotemporal Feature.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 1, p. 124
- By:
- Publication type:
- Article
Fuzzy Approach for Intrusion Detection System: A Survey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 1, p. 101
- By:
- Publication type:
- Article
Security Policies of Sharing Health Care Data with Authentication and Authorization.
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 5, p. 56
- By:
- Publication type:
- Article
DATA INTEGRITY: THE VALUE OF CLINICAL CONTEXT IN DATA PREPARATION AND ENTRY.
- Published in:
- Oncology Nursing Forum, 2007, v. 34, n. 1, p. 245
- By:
- Publication type:
- Article
Trust and Privacy Solutions Based on Holistic Service Requirements.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 16, doi. 10.3390/s16010016
- By:
- Publication type:
- Article
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 1, p. 39
- By:
- Publication type:
- Article
Stretching the Limit, The Functioning of the GDPR's Notion of Consent in the context of Data Intermediary Services.
- Published in:
- European Data Protection Law Review (EDPL), 2022, v. 8, n. 2, p. 238, doi. 10.21552/edpl/2022/2/10
- By:
- Publication type:
- Article
Translational research platforms integrating clinical and omics data: a review of publicly available solutions.
- Published in:
- Briefings in Bioinformatics, 2015, v. 16, n. 2, p. 280, doi. 10.1093/bib/bbu006
- By:
- Publication type:
- Article
Privacy Expectations of Social Media Users: The Role of Informed Consent in Privacy Policies.
- Published in:
- Policy & Internet, 2014, v. 6, n. 3, p. 268, doi. 10.1002/1944-2866.POI366
- By:
- Publication type:
- Article
MODELO DE ACESSO MULTINÍVEL EM SISTEMAS WEB UTILIZANDO PROGRAMAÇÃO ORIENTADA A ASPECTOS.
- Published in:
- Brazilian Journal of Scientific Administration / Revista Brasileira de Administração Científica, 2012, v. 3, n. 2, p. 57, doi. 10.6008/ESS2179-684X.2012.002.0004
- By:
- Publication type:
- Article
S-TRAP: Optimization and Evaluation of Timely Recovery to Any Point-in-time (TRAP).
- Published in:
- Computer Science & Information Systems, 2012, v. 9, n. 1, p. 431, doi. 10.2298/CSIS110413071W
- By:
- Publication type:
- Article
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1328, doi. 10.3837/tiis.2013.05.022
- By:
- Publication type:
- Article
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1313, doi. 10.3837/tiis.2013.05.021
- By:
- Publication type:
- Article
Privacy Analysis of User Behavior Using Alignments.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 255, doi. 10.1524/itit.2013.2006
- By:
- Publication type:
- Article
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- By:
- Publication type:
- Article
A Cloud Computing-Based Analysis System for the National R&D Information Concerning with the Data Security.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 977, doi. 10.1007/s11277-016-3359-9
- By:
- Publication type:
- Article
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 715, doi. 10.1007/s11277-015-3094-7
- By:
- Publication type:
- Article
Database Fortification using Demand Data Enciphering.
- Published in:
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 4, p. 37
- By:
- Publication type:
- Article
PROGRAM AND TECHNICAL ASPECTS OF CRYPTOGRAPHIC DEFENCE OF DATA STORAGE.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2015, v. 5, n. 4, p. 347
- By:
- Publication type:
- Article
FACEBOOK TE TIENE FICHADO.
- Published in:
- Revista de Comunicación (1888198X), 2011, n. 21, p. 6
- Publication type:
- Article
Big Data and the 21<sup>st</sup> Century Church.
- Published in:
- Dialog: A Journal of Theology, 2014, v. 53, n. 1, p. 23, doi. 10.1111/dial.12085
- By:
- Publication type:
- Article
Privacy Concern in Western Balkan Countries: Developing a Typology of Citizens.
- Published in:
- Journal of Balkan & Near Eastern Studies, 2015, v. 17, n. 1, p. 29, doi. 10.1080/19448953.2014.990278
- By:
- Publication type:
- Article
Cross-border exchange of information between the member states of the European Union aimed at preventing and combating violations of traffic rules affecting road safety. Some critical opinions.
- Published in:
- Acta Universitatis George Bacovia. Juridica, 2016, v. 5, n. 1, p. 59
- By:
- Publication type:
- Article
Personal data leakage prevention system for network channels.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 279, doi. 10.18372/2225-5036.20.7556
- By:
- Publication type:
- Article