Academic literature on the topic 'Confidentiality of sources'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Confidentiality of sources.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Confidentiality of sources"
Emslie, J. A., and P. Christie. "Confidentiality for doctors with AIDS. Official sources maintained confidentiality." BMJ 307, no. 6903 (August 28, 1993): 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.
Full textHarala, Riitta, and Anna-Leena Reinikainen. "Confidentiality in the use of administrative data sources." Statistical Journal of the United Nations Economic Commission for Europe 13, no. 4 (December 1, 1996): 361–68. http://dx.doi.org/10.3233/sju-1996-13404.
Full textAlexander, Laurence B. "Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources." Newspaper Research Journal 14, no. 3-4 (June 1993): 45–59. http://dx.doi.org/10.1177/073953299301400306.
Full textWOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.
Full textGassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (March 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.
Full textMcHone-Chase, Sarah. "Sources: Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers." Reference & User Services Quarterly 49, no. 1 (September 1, 2009): 104. http://dx.doi.org/10.5860/rusq.49n1.104.
Full textFernandez, Joseph M. "Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts." Asia Pacific Media Educator 27, no. 2 (October 25, 2017): 202–18. http://dx.doi.org/10.1177/1326365x17728822.
Full textAinsworth, Frank, and Patricia Hansen. "Confidentiality in child protection cases Who benefits?" Children Australia 35, no. 3 (2010): 11–17. http://dx.doi.org/10.1017/s1035077200001127.
Full textSHAHBAZYAN, K. "Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development: practices of EU and countries of the world." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.
Full textBiałkowska, Paula Maria. "Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America." Review of European and Comparative Law 45, no. 2 (June 16, 2021): 77–103. http://dx.doi.org/10.31743/recl.11456.
Full textDissertations / Theses on the topic "Confidentiality of sources"
Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Full textFreedom of expression and communication is a fundamental right, and one of the key elements of a democracy. For this reason, it has been protected for a long time. However, one of its pillars, the protection of the confidentiality of a journalist's sources, has for a long time been ignored, and even today is not completely recognized in France. This state of affairs is mainly due to political factors. This refusal to acknowledge, and this partial and tardy recognition, can be largely explained by the fact that investigative reporting, in the public interest, can potentially target politicians. Furthermore, even a partial recognition of this right can be neutralised by increasingly sophisticated modern methods of surveillance, such as the Pegasus computer program. Journalists find themselves on an uneven playing field when they seek to take on public authorities, big business or indeed organised criminal groups who want to uncover the sources behind an investigative report. This is why the French system falls short, despite a ruling by the European Court of Human Rights (ECHR) in favour of protecting journalists' sources. However, a proper protection of these sources is well within the bounds of possibility. One has only to look as far as Belgium, where an effective and exemplary system is in place. An overhaul of the French system is well overdue, because, as the ECHR puts it, journalists are the vanguards of a democracy
Van, Assche Gilles. "Information-Theoretic aspects of quantum key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211050.
Full textLa distribution quantique de clés est une technique cryptographique permettant l'échange de clés secrètes dont la confidentialité est garantie par les lois de la mécanique quantique. Le comportement particulier des particules élémentaires est exploité. En effet, en mécanique quantique, toute mesure sur l'état d'une particule modifie irrémédiablement cet état. En jouant sur cette propriété, deux parties, souvent appelées Alice et Bob, peuvent encoder une clé secrète dans des porteurs quantiques tels que des photons uniques. Toute tentative d'espionnage demande à l'espion, Eve, une mesure de l'état du photon qui transmet un bit de clé et donc se traduit par une perturbation de l'état. Alice et Bob peuvent alors se rendre compte de la présence d'Eve par un nombre inhabituel d'erreurs de transmission.
L'information échangée par la distribution quantique n'est pas directement utilisable mais doit être d'abord traitée. Les erreurs de transmissions, qu'elles soient dues à un espion ou simplement à du bruit dans le canal de communication, doivent être corrigées grâce à une technique appelée réconciliation. Ensuite, la connaissance partielle d'un espion qui n'aurait perturbé qu'une partie des porteurs doit être supprimée de la clé finale grâce à une technique dite d'amplification de confidentialité.
Cette thèse s'inscrit dans le contexte de la distribution quantique de clé où les porteurs sont des états continus de la lumière. En particulier, une partie importante de ce travail est consacrée au traitement de l'information continue échangée par un protocole particulier de distribution quantique de clés, où les porteurs sont des états cohérents de la lumière. La nature continue de cette information implique des aménagements particuliers des techniques de réconciliation, qui ont surtout été développées pour traiter l'information binaire. Nous proposons une technique dite de réconciliation en tranches qui permet de traiter efficacement l'information continue. L'ensemble des techniques développées a été utilisé en collaboration avec l'Institut d'Optique à Orsay, France, pour produire la première expérience de distribution quantique de clés au moyen d'états cohérents de la lumière modulés continuement.
D'autres aspects importants sont également traités dans cette thèse, tels que la mise en perspective de la distribution quantique de clés dans un contexte cryptographique, la spécification d'un protocole complet, la création de nouvelles techniques d'amplification de confidentialité plus rapides à mettre en œuvre ou l'étude théorique et pratique d'algorithmes alternatifs de réconciliation.
Enfin, nous étudions la sécurité du protocole à états cohérents en établissant son équivalence à un protocole de purification d'intrication. Sans entrer dans les détails, cette équivalence, formelle, permet de valider la robustesse du protocole contre tout type d'espionnage, même le plus compliqué possible, permis par les lois de la mécanique quantique. En particulier, nous généralisons l'algorithme de réconciliation en tranches pour le transformer en un protocole de purification et nous établissons ainsi un protocole de distribution quantique sûr contre toute stratégie d'espionnage.
Quantum key distribution is a cryptographic technique, which allows to exchange secret keys whose confidentiality is guaranteed by the laws of quantum mechanics. The strange behavior of elementary particles is exploited. In quantum mechnics, any measurement of the state of a particle irreversibly modifies this state. By taking advantage of this property, two parties, often called Alice and bob, can encode a secret key into quatum information carriers such as single photons. Any attempt at eavesdropping requires the spy, Eve, to measure the state of the photon and thus to perturb this state. Alice and Bob can then be aware of Eve's presence by a unusually high number of transmission errors.
The information exchanged by quantum key distribution is not directly usable but must first be processed. Transmission errors, whether they are caused by an eavesdropper or simply by noise in the transmission channel, must be corrected with a technique called reconciliation. Then, the partial knowledge of an eavesdropper, who would perturb only a fraction of the carriers, must be wiped out from the final key thanks to a technique called privacy amplification.
The context of this thesis is the quantum key distribution with continuous states of light as carriers. An important part of this work deals with the processing of continuous information exchanged by a particular protocol, where the carriers are coherent states of light. The continuous nature of information in this case implies peculiar changes to the reconciliation techniques, which have mostly been developed to process binary information. We propose a technique called sliced error correction, which allows to efficiently process continuous information. The set of the developed techniques was used in collaboration with the Institut d'Optique, Orsay, France, to set up the first experiment of quantum key distribution with continuously-modulated coherent states of light.
Other important aspects are also treated in this thesis, such as placing quantum key distribution in the context of a cryptosystem, the specification of a complete protocol, the creation of new techniques for faster privacy amplification or the theoretical and practical study of alternate reconciliation algorithms.
Finally, we study the security of the coherent state protocol by analyzing its equivalence with an entanglement purification protocol. Without going into the details, this formal equivalence allows to validate the robustness of the protocol against any kind of eavesdropping, even the most intricate one allowed by the laws of quantum mechanics. In particular, we generalize the sliced error correction algorithm so as to transform it into a purification protocol and we thus establish a quantum key distribution protocol secure against any eavesdropping strategy.
Doctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textMedeiros, Damian J. A. ""According to my sources..." A proposed constitutional framework for adjudicating reporter-source confidentiality in Canada." 2009. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=958046&T=F.
Full textBooks on the topic "Confidentiality of sources"
Great Britain. Office of Population Censuses and Surveys. Library., ed. Privacy, confidentiality and data protection: Source works in OPCS library. London: OPCS, 1986.
Find full textJ, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.
Find full textCarlson, Matt. “Journalism on Trial”: Confidentiality and the Plame Leak Case. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0006.
Full textFried, Adam L., and Celia B. Fisher. Emerging Ethical and Legal Issues in Clinical Child and Adolescent Psychology. Edited by Thomas H. Ollendick, Susan W. White, and Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.9.
Full textVeatch, Robert M., Amy Haddad, and E. J. Last. Experimentation on Human Subjects. Edited by Robert M. Veatch, Amy Haddad, and E. J. Last. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.003.0016.
Full textAdams, Helen R. Protecting Intellectual Freedom and Privacy in Your School Library. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798216002253.
Full textVeatch, Robert M., Amy Haddad, and E. J. Last. Case Studies in Pharmacy Ethics. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.001.0001.
Full textPowers, Michael, and Anthony Barton. Clinical Negligence. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781526521552.
Full textSchanz, Stephen J., P. Wilson, and R. J. Rodrigues. Regulation of Privacy and Data Protection in the Use of Electronic Health Information: An International Perspective and Reference Source on Regulatory and Legal Issues Related to Person-identifiable Health Databases. Pan American Health Organization (PAHO), 2001.
Find full textBook chapters on the topic "Confidentiality of sources"
Pearson, Mark. "Confidentiality, secrets, sources and disclosure." In The Communicator's Guide to Media Law and Ethics, 142–74. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.
Full textReymond-Eniaeva, Elza. "Sources." In Towards a Uniform Approach to Confidentiality of International Commercial Arbitration, 5–27. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19003-3_2.
Full textSchulz, David A., and Valerie Belair-Gagnon. "6. Rescuing A Reporter’S Right To Protect The Confidentiality Of Sources." In Journalism After Snowden, edited by Emily Bell and Taylor Owen, 97–113. New York Chichester, West Sussex: Columbia University Press, 2017. http://dx.doi.org/10.7312/bell17612-009.
Full textGhirelli, Corinna, Samuel Hurtado, Javier J. Pérez, and Alberto Urtasun. "New Data Sources for Central Banks." In Data Science for Economics and Finance, 169–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66891-4_8.
Full textStenbeck, Magnus, Sonja Eaker Fält, and Jane Reichel. "Swedish Law on Personal Data in Biobank Research: Permissible But Complex." In GDPR and Biobanking, 379–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_21.
Full textBoldrin, Luca, Giovanni Paolo Sellitto, and Jaak Tepandi. "TOOP Trust Architecture." In The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Full textMedhane, Darshan V., and Arun Kumar Sangaiah. "Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks." In Advances in Intelligent Systems and Computing, 347–55. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_38.
Full textLasorsa, Dominic L. "Sources, Confidentiality of." In Encyclopedia of International Media and Communications, 193–203. Elsevier, 2003. http://dx.doi.org/10.1016/b0-12-387670-2/00267-3.
Full textFernandez, Joseph M. "Journalist-source confidentiality practice rules." In Journalists and Confidential Sources, 87–109. Routledge, 2020. http://dx.doi.org/10.4324/9781003035411-5.
Full textPearson, Mark, and Mark Polden. "Keeping secrets: Confidentiality and sources." In The Journalist’s Guide to Media Law, 311–52. Routledge, 2020. http://dx.doi.org/10.4324/9781003117995-13.
Full textConference papers on the topic "Confidentiality of sources"
Tenorio, Viviane, Leonardo Souza, Maxwell Albuquerque, Rodolfo Marinho, Matteus Silva, and Andrey Brito. "Low-Cost, Practical Data Confidentiality Support for IoT Data Sources." In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046097.
Full textNashed, Nashaat, and Roman Fedorov. "Constitutional pronection of personal data – a case study of data confidentiality in Egyptian banks." In Development of legal systems in Russia and foreign countries: problems of theory and practice. ru: Publishing Center RIOR, 2021. http://dx.doi.org/10.29039/02061-6-201-211.
Full textMikštienė, Ruta, and Violeta Keršulienė. "Legal decision support system application possibility in corporate governance." In Business and Management 2016. VGTU Technika, 2016. http://dx.doi.org/10.3846/bm.2016.39.
Full textAbsi-Halabi, Nour J., and Ali A. Yassine. "Optimal Release Planning Using Machine Learning and Linear Integer Programming for Ideas in a Crowdsourcing Platform." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-68177.
Full textWeiland, Nathan T., Blake W. Lance, and Sandeep R. Pidaparti. "sCO2 Power Cycle Component Cost Correlations From DOE Data Spanning Multiple Scales and Applications." In ASME Turbo Expo 2019: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/gt2019-90493.
Full textRodrigues, S. S., J. O. Braga, J. M. Xavier, G. Pauli, A. M. Mata, E. Margotti, M. B. Demay, and G. D. Donatelli. "Digital Twin of Subsea Assets as a Tool for Integrity Management and Risk-Based Inspection: Challenges and Perspectives." In Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32757-ms.
Full textKazykhanov, A. A., D. R. Kazykhanova, and D. V. Rednikov. "Printing devices, as a source of threats to the confidentiality of information." In ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ. НИЦ «Л-Журнал», 2018. http://dx.doi.org/10.18411/lj-10-2018-191.
Full textKoumpan, Elizabeth, and Anna Topol. "Value-driven architecture enabling new interaction models in Society 5.0." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003765.
Full textNematy, Hoda. "Secure Protocol for Four D2D Scenarios." In 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111102.
Full textKarahasanovic, Amela. "Is it Ethical to Log Users’ Actions in Software Engineering Experiments?" In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2700.
Full textReports on the topic "Confidentiality of sources"
Cantor, Amy, Heidi D. Nelson, Miranda Pappas, Chandler Atchison, Brigit Hatch, Nathalie Huguet, Brittny Flynn, and Marian McDonagh. Effectiveness of Telehealth for Women’s Preventive Services. Agency for Healthcare Research and Quality (AHRQ), June 2022. http://dx.doi.org/10.23970/ahrqepccer256.
Full text