Showing 1 - 10 of 33,024
-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when …The informatics security concept is defined. For informatics applications which have a classical structure, the …
Persistent link: https://www.econbiz.de/10009416380
Persistent link: https://www.econbiz.de/10010367520
pursued to sensitive data in order to establish a level of effective privacy which is included in the concerns of security of … of criteria and processes of measurement, called metrics, is briefly reviewed in terms of indicators and daily procedures …. Some issues of management information systems security are briefly addressed, along with a note on measuring security …
Persistent link: https://www.econbiz.de/10012047076
This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between … a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare … case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy …
Persistent link: https://www.econbiz.de/10005288616
This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between … a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare … case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy …
Persistent link: https://www.econbiz.de/10010731480
This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between … a privacy protector ,and an information gatherer .The aims with such metrics are : -to allow to assess and compare … case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy …
Persistent link: https://www.econbiz.de/10009022009
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
This paper deals with the safety evaluation of agrarian portals operated in the Czech Republic. It focuses mainly on … security authentication process when accessing remote servers. The security of internet banking application has high level but …€ (Data boxes) were also included to compare the results of agricultural portals security. The aim of this paper is to point …
Persistent link: https://www.econbiz.de/10011142397
Persistent link: https://www.econbiz.de/10011596109
critical importance that have pushed food security and environmental sustainability to the top of the political agenda … approach, enhanced by inputs from the resilience literature, has been adapted to analyze the main issues related to food and … nutrition security. Through causal factor analysis, the resulting conceptual framework improves the design of information …
Persistent link: https://www.econbiz.de/10010813809