|
|
|
George Konstantinidis, Adriane Chapman, Mark J. Weal, Ahmed Alzubaidi, Lisa M. Ballard and Anneke M. Lucassen
Data processing agreements in health data management are laid out by organisations in monolithic ?Terms and Conditions? documents written in natural legal language. These top-down policies usually protect the interest of the service providers, rather tha...
ver más
|
|
|
|
|
|
|
Jedrzej Wieczorkowski, Przemyslaw Polak
Pág. 57 - 71
The phenomenon of big data includes technological (new opportunities), business (application), and social aspect. The social aspect applies to the social consequences of the use of big data methods, in particular, those related to the processing of perso...
ver más
|
|
|
|
|
|
|
Dimitrios Papamartzivanos, Sofia Anna Menesidou, Panagiotis Gouvas and Thanassis Giannetsos
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy...
ver más
|
|
|
|
|
|
|
Hugo Lopes, Ivan Miguel Pires, Hector Sánchez San Blas, Raúl García-Ovejero and Valderi Leithardt
The mobile devices cause a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone ar...
ver más
|
|
|
|
|
|
|
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi...
ver más
|
|
|
|
|
|
|
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou...
ver más
|
|
|
|
|
|
|
Christoph Stach
Currently, data are often referred to as the oil of the 21st century. This comparison is not only used to express that the resource data are just as important for the fourth industrial revolution as oil was for the technological revolution in the late 19...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t...
ver más
|
|
|
|
|
|
|
Ola N. Halawi, Faisal N. Abu-Khzam and Sergio Thoumi
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work o...
ver más
|
|
|
|
|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Gongxue Sun and Tao Feng
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize...
ver más
|
|
|
|
|
|
|
Ching-Yu Yang and Ja-Ling Wu
During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (RDH) ...
ver más
|
|
|
|
|
|
|
Yangheran Piao, Kai Ye and Xiaohui Cui
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished fina...
ver más
|
|
|
|
|
|
|
Sevgi Arca and Rattikorn Hewett
Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better individual healthcare and well-being. By enhancing self-monitoring, data collection and sharing amon...
ver más
|
|
|
|
|
|
|
Songyuan Li, Hui Tian, Hong Shen and Yingpeng Sang
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it...
ver más
|
|
|
|
|
|
|
Jane Henriksen-Bulmer, Shamal Faily and Sheridan Jeary
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring the boundaries between the physical and virtual environments. While this brings many opportunities for progress, it also adds a new layer of complexity t...
ver más
|
|
|
|
|
|
|
Elias Dritsas, Andreas Kanavos, Maria Trigka, Gerasimos Vonitsanos, Spyros Sioutas and Athanasios Tsakalidis
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key sol...
ver más
|
|
|
|
|
|
|
Alessandro Marco Rosini Filho,Alessandro Marco Rosini,Angelo Palmisano
Pág. 13 - 34
With the great expansion in the volume of data created in recent years, coupled with the speed at which the most distinct information is generated from multiple and different origins, this work developed through qualitative method, based on a review and ...
ver más
|
|
|
|