In recent years, techniques to automatically analyze lots of data have advanced significantly. The possibility to gather and analyze large amounts of data has challenged security research in two unique ways. First, the analysis of Big Data can threaten users’ privacy by merging and connecting data from different sources. Chapter 2 studies how patients’ medical data can be protected in a world where Big Data techniques can be used to easily analyze large amounts of DNA data. Second, Big Data techniques can be used to improve the security of software systems. In Chapter 4 I analyzed data gathered from internet-wide certificate scans to make recommendations on which certificate authorities can be removed from trust stores. In Chapter 5 I analy...
The explosion of data available on the internet is very increasing in recent years. One of the most ...
Widespread web application adoption created a large, complex and varied amount of data known as Big...
This perspective paper discusses challenges and risks of the information age, and the implications f...
Master of ScienceDepartment of Computing and Information SciencesEugene VassermanThe unprecedented g...
Big data facilitates the processing and management of huge amounts of data. In health, the main info...
The purpose of this research is to analyze the security of next-generation big data processing (BDP)...
Data and cyber security, whether defined from the point of view of corporations, individuals, or Int...
In this chapter, we present a brief overview of important topics regarding the connection of data sc...
The computer security problems that we face begin in computer programs that we write. The exploitat...
Big data has unlocked the door to significant advances in a wide range of scientific fields, and it ...
Big data, a recently popular term that refers to a massive collection of very large and complex data...
This paper talks about ways in which infrastructure for biomedical data-intensive discovery is opera...
By broad consensus, data security laws have failed to stem a rising tide of data breaches. Lawmakers...
37th International Conference on Information Systems, Dublin, Ireland, 11-14 December 2016This is th...
The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security ...
The explosion of data available on the internet is very increasing in recent years. One of the most ...
Widespread web application adoption created a large, complex and varied amount of data known as Big...
This perspective paper discusses challenges and risks of the information age, and the implications f...
Master of ScienceDepartment of Computing and Information SciencesEugene VassermanThe unprecedented g...
Big data facilitates the processing and management of huge amounts of data. In health, the main info...
The purpose of this research is to analyze the security of next-generation big data processing (BDP)...
Data and cyber security, whether defined from the point of view of corporations, individuals, or Int...
In this chapter, we present a brief overview of important topics regarding the connection of data sc...
The computer security problems that we face begin in computer programs that we write. The exploitat...
Big data has unlocked the door to significant advances in a wide range of scientific fields, and it ...
Big data, a recently popular term that refers to a massive collection of very large and complex data...
This paper talks about ways in which infrastructure for biomedical data-intensive discovery is opera...
By broad consensus, data security laws have failed to stem a rising tide of data breaches. Lawmakers...
37th International Conference on Information Systems, Dublin, Ireland, 11-14 December 2016This is th...
The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security ...
The explosion of data available on the internet is very increasing in recent years. One of the most ...
Widespread web application adoption created a large, complex and varied amount of data known as Big...
This perspective paper discusses challenges and risks of the information age, and the implications f...