As data and information is stored, combined and accessed almost everywhere, in-formation security and privacy becomes increasingly important to companies that offer access to data. In comparison to network and hardware security that often focus on the protection of network or hardware from attackers from the outside, information security involves protection of certain information from users that have at least some access rights "inside" an information system. One key challenge in information secu-rity and privacy is to meet two contrary goals at the same time, i.e. to allow users to run applications which access the data that they need, but to prevent the same users from being able to infer sensitive information from the results returned by...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Outsourcing of their data to third-party service providers is a cost-effective data management strat...
This poster is about the specific challenges in setting up a secure data service at GESIS – Leibniz ...
As data and information is stored, combined and accessed almost everywhere, in-formation security an...
Recent advances in technology have given rise to the popularity and success of many data- related se...
Preface. The new emerging technologies put new requirements on security and data management. As data...
Outsourcing data to the cloud is becoming increasingly prevalent. To ensure data confidentiality, en...
The use of private data is ubiquitous. On one hand, people submit their private data to obtain servi...
International audienceWith more and more information being exchanged or published on the Web or in p...
In recently large amount of information are collected in multiple organizations like health care org...
The last several decades have witnessed a phenomenal growth in the networking infrastructure connect...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
In this age of universal information sharing, there is indeed no time at which information security ...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
People always tend to protect assets regardless of what they are. For example, a user may keep a mem...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Outsourcing of their data to third-party service providers is a cost-effective data management strat...
This poster is about the specific challenges in setting up a secure data service at GESIS – Leibniz ...
As data and information is stored, combined and accessed almost everywhere, in-formation security an...
Recent advances in technology have given rise to the popularity and success of many data- related se...
Preface. The new emerging technologies put new requirements on security and data management. As data...
Outsourcing data to the cloud is becoming increasingly prevalent. To ensure data confidentiality, en...
The use of private data is ubiquitous. On one hand, people submit their private data to obtain servi...
International audienceWith more and more information being exchanged or published on the Web or in p...
In recently large amount of information are collected in multiple organizations like health care org...
The last several decades have witnessed a phenomenal growth in the networking infrastructure connect...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
In this age of universal information sharing, there is indeed no time at which information security ...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
People always tend to protect assets regardless of what they are. For example, a user may keep a mem...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Outsourcing of their data to third-party service providers is a cost-effective data management strat...
This poster is about the specific challenges in setting up a secure data service at GESIS – Leibniz ...