Journal articles on the topic 'Data security and Data privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data security and Data privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yerbulatov, Sultan. "Data Security and Privacy in Data Engineering." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 232–36. http://dx.doi.org/10.21275/es24318121241.
Hennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber, and A. C. Nelson. "Data-centric security: Integrating data privacy and data security." IBM Journal of Research and Development 53, no. 2 (March 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.
Suleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Gaff, Brian M., Thomas J. Smedinghoff, and Socheth Sor. "Privacy and Data Security." Computer 45, no. 3 (March 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.
Adam, J. A. "Data security-cryptography=privacy?" IEEE Spectrum 29, no. 8 (August 1992): 29–35. http://dx.doi.org/10.1109/6.144533.
S, Surya Prasad, and Gobi Natesan. "Ensuring Data Security and Privacy in Cloud Infrastructure." International Journal of Research Publication and Reviews 5, no. 3 (March 21, 2024): 5012–16. http://dx.doi.org/10.55248/gengpi.5.0324.0817.
Kumar.R, Dr Prasanna, Porselvan G, Prem Kumar S, and Robinlash F. "Security and Privacy Based Data Sharing in Cloud Computing." International Journal of Innovative Research in Engineering & Management 5, no. 1 (January 2018): 42–49. http://dx.doi.org/10.21276/ijirem.2018.5.1.9.
George, Jomin, and Takura Bhila. "Security, Confidentiality and Privacy in Health of Healthcare Data." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 373–77. http://dx.doi.org/10.31142/ijtsrd23780.
Kapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Danish, Muhammad. "Big Data Security And Privacy." International Journal of Computer Trends and Technology 67, no. 5 (May 25, 2019): 20–26. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p104.
Martucci, William C., and Jennifer K. Oldvader. "Workplace privacy and data security." Employment Relations Today 37, no. 2 (July 13, 2010): 59–66. http://dx.doi.org/10.1002/ert.20299.
Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Eghmazi, Ali, Mohammadhossein Ataei, René Jr Landry, and Guy Chevrette. "Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy." IoT 5, no. 1 (January 10, 2024): 20–34. http://dx.doi.org/10.3390/iot5010002.
Bourvil and Levi. "Multi-Level Trust Privacy Preserving Data Mining to Enhance Data Security and Prevent Leakage of the Sensitive Data." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 2 (May 30, 2017): 21–25. http://dx.doi.org/10.9756/bijiems.8327.
Smith, J. H., and JS Horne. "Data privacy and DNA data." IASSIST Quarterly 47, no. 3-4 (December 14, 2023): 1–3. http://dx.doi.org/10.29173/iq1094.
Yang, Jing, Lianwei Qu, and Yong Wang. "Multidomain Fusion Data Privacy Security Framework." Wireless Communications and Mobile Computing 2021 (December 20, 2021): 1–26. http://dx.doi.org/10.1155/2021/8492223.
Kumar, Raj, and Sushma Pal. "Data security and privacy through stenography." Global Sci-Tech 10, no. 2 (2018): 98. http://dx.doi.org/10.5958/2455-7110.2018.00017.4.
Taitsman, Julie K., Christi Macrina Grimm, and Shantanu Agrawal. "Protecting Patient Privacy and Data Security." New England Journal of Medicine 368, no. 11 (March 14, 2013): 977–79. http://dx.doi.org/10.1056/nejmp1215258.
Yan, Zheng, Willy Susilo, Elisa Bertino, Jun Zhang, and Laurence T. Yang. "AI-driven data security and privacy." Journal of Network and Computer Applications 172 (December 2020): 102842. http://dx.doi.org/10.1016/j.jnca.2020.102842.
Xiang, Yang, Man Ho Au, and Miroslaw Kutylowsky. "Security and privacy in big data." Concurrency and Computation: Practice and Experience 28, no. 10 (March 31, 2016): 2856–57. http://dx.doi.org/10.1002/cpe.3796.
Mandal, Sanjeev Kumar, Amit Sharma, Santosh Kumar Henge, Sumaira Bashir, Madhuresh Shukla, and Asim Tara Pathak. "Secure data encryption key scenario for protecting private data security and privacy." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 269–81. http://dx.doi.org/10.47974/jdmsc-1881.
Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, and Yong Ren. "Information Security in Big Data: Privacy and Data Mining." IEEE Access 2 (2014): 1149–76. http://dx.doi.org/10.1109/access.2014.2362522.
Wu, Xuanting, and Yi Chen. "Research on Personal Data Privacy Security in the Era of Big Data." Journal of Humanities and Social Sciences Studies 4, no. 3 (September 6, 2022): 228–35. http://dx.doi.org/10.32996/jhsss.2022.4.3.24.
Liu, Jinyang. "An overview of big data mining and data privacy protection technologies." Applied and Computational Engineering 21, no. 1 (October 23, 2023): 187–92. http://dx.doi.org/10.54254/2755-2721/21/20231143.
Harbola, Aditya. "Use of data auditing for encrypted data stored in cloud environment." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 293–302. http://dx.doi.org/10.17762/msea.v70i1.2311.
Kumar, K. Praveen. "Efficient Encryption Algorithm for Data Security in Big Data Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1127–31. http://dx.doi.org/10.22214/ijraset.2021.38995.
Livshitz, Ilya. "Data privacy assurance for remote work." Energy Safety and Energy Economy 1 (February 2022): 57–62. http://dx.doi.org/10.18635/2071-2219-2022-1-57-62.
Shahid, Arsalan, Thien-An Ngoc Nguyen, and M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications." Sensors 21, no. 7 (March 28, 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Gatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Thanh Chi Phan and Hung Chi Tran. "Consideration of Data Security and Privacy Using Machine Learning Techniques." International Journal of Data Informatics and Intelligent Computing 2, no. 4 (December 19, 2023): 20–32. http://dx.doi.org/10.59461/ijdiic.v2i4.90.
J A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (June 23, 2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Chan, Tom, Concetta Tania Di Iorio, Simon De Lusignan, Daniel Lo Russo, Craig Kuziemsky, and Siaw-Teng Liaw. "UK National Data Guardian for Health and Care’s Review of Data Security: Trust, better security and opt-outs." Journal of Innovation in Health Informatics 23, no. 3 (December 20, 2016): 627. http://dx.doi.org/10.14236/jhi.v23i3.909.
Qin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
N.Maniam, Jacentha, and Dalbir Singh. "TOWARDS DATA PRIVACY AND SECURITY FRAMEWORK IN BIG DATA GOVERNANCE." International Journal of Software Engineering and Computer Systems 6, no. 1 (May 31, 2020): 41–51. http://dx.doi.org/10.15282/ijsecs.6.1.2020.5.0068.
Yao, Lu. "Holistic Data Security: A Balanced Approach to Data and Privacy." Információs Társadalom 23, no. 4 (December 31, 2023): 102. http://dx.doi.org/10.22503/inftars.xxiii.2023.4.7.
Shobha Rani, P., and Vigneswari D. "SECURITY AND PRIVACY IN BIG DATA ANALYTICS." International Journal on Intelligent Electronic Systems 10, no. 2 (2016): 32–35. http://dx.doi.org/10.18000/ijies.30155.
Atoum, Ibrahim A., and Ismail M. Keshta. "Big data management: Security and privacy concerns." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 5 (May 2021): 73–83. http://dx.doi.org/10.21833/ijaas.2021.05.009.
Akinwunmi, O. O., S. A. Onashoga, and O. Folorunso. "Employing differential privacy for big data security." Journal of Computer Science and Its Application 26, no. 2 (February 11, 2020): 134. http://dx.doi.org/10.4314/jcsia.v26i2.13.
Guan, Yunguo, Jun Shao, Guiyi Wei, and Mande Xie. "Data Security and Privacy in Fog Computing." IEEE Network 32, no. 5 (September 2018): 106–11. http://dx.doi.org/10.1109/mnet.2018.1700250.
Matturdi, Bardi, Xianwei Zhou, Shuai Li, and Fuhong Lin. "Big Data security and privacy: A review." China Communications 11, no. 14 (2014): 135–45. http://dx.doi.org/10.1109/cc.2014.7085614.
Win, Khin Than, and Willy Susilo. "Information security and privacy of health data." International Journal of Healthcare Technology and Management 7, no. 6 (2006): 492. http://dx.doi.org/10.1504/ijhtm.2006.010413.
Li, Yan, Young-Sik Jeong, Byeong-Seok Shin, and Jong Hyuk Park. "Crowdsensing Multimedia Data: Security and Privacy Issues." IEEE MultiMedia 24, no. 4 (October 2017): 58–66. http://dx.doi.org/10.1109/mmul.2017.4031306.
SIMPSON, ROY L. "Ensuring Patient Data, Privacy, Confidentiality and Security." Nursing Management (Springhouse) 25, no. 7 (July 1994): 18???22. http://dx.doi.org/10.1097/00006247-199407000-00004.
priya.E, Shanmuga, and R. Kavi tha. "Big Data Security and Privacy- A Survey." International Journal of Computer Trends and Technology 49, no. 3 (July 25, 2017): 150–54. http://dx.doi.org/10.14445/22312803/ijctt-v49p123.
Bertino, Elisa. "Editorial: Introduction to Data Security and Privacy." Data Science and Engineering 1, no. 3 (September 2016): 125–26. http://dx.doi.org/10.1007/s41019-016-0021-1.
Брижко, В. М., and В. Г. Пилипчук. "Privacy, confidentiality and security of personal data." INFORMATION AND LAW, no. 1(32) (February 20, 2020): 33–46. http://dx.doi.org/10.37750/2616-6798.2020.1(32).200304.
T.K, Adarsh, and R. Jebakumar Dr. "Security & privacy in IoT Data Provenance." International Journal of Engineering and Technology 10, no. 3 (June 30, 2018): 843–47. http://dx.doi.org/10.21817/ijet/2018/v10i3/181003085.
Sun, Yunchuan, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu. "Data Security and Privacy in Cloud Computing." International Journal of Distributed Sensor Networks 10, no. 7 (January 2014): 190903. http://dx.doi.org/10.1155/2014/190903.
Pant, Abhishek. "Importance of Data Security and Privacy Compliance." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 1561–65. http://dx.doi.org/10.22214/ijraset.2023.56862.
Ramachandra, Mohan Naik, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu, and Kivudujogappa Lingappa Hemalatha. "An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard." Big Data and Cognitive Computing 6, no. 4 (September 26, 2022): 101. http://dx.doi.org/10.3390/bdcc6040101.