Showing 1 - 10 of 11
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970
When considering information security and privacy issues most of the attention has previously focussed on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434971
incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with … information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is …
Persistent link: https://www.econbiz.de/10009434972
Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have...
Persistent link: https://www.econbiz.de/10009434973
Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the … mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data … as data integrity management. To address this issue, we present a novel fragile watermarking scheme, which embeds a …
Persistent link: https://www.econbiz.de/10009434995
the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered …Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security … properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider …
Persistent link: https://www.econbiz.de/10009435000
Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless …
Persistent link: https://www.econbiz.de/10009435001