Articoli di riviste sul tema "Data security and Data privacy"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Data security and Data privacy".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Yerbulatov, Sultan. "Data Security and Privacy in Data Engineering". International Journal of Science and Research (IJSR) 13, n. 4 (5 aprile 2024): 232–36. http://dx.doi.org/10.21275/es24318121241.
Hennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber e A. C. Nelson. "Data-centric security: Integrating data privacy and data security". IBM Journal of Research and Development 53, n. 2 (marzo 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.
Suleiman, James, e Terry Huston. "Data Privacy and Security". International Journal of Information Security and Privacy 3, n. 2 (aprile 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Gaff, Brian M., Thomas J. Smedinghoff e Socheth Sor. "Privacy and Data Security". Computer 45, n. 3 (marzo 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.
Adam, J. A. "Data security-cryptography=privacy?" IEEE Spectrum 29, n. 8 (agosto 1992): 29–35. http://dx.doi.org/10.1109/6.144533.
S, Surya Prasad, e Gobi Natesan. "Ensuring Data Security and Privacy in Cloud Infrastructure". International Journal of Research Publication and Reviews 5, n. 3 (21 marzo 2024): 5012–16. http://dx.doi.org/10.55248/gengpi.5.0324.0817.
Kumar.R, Dr Prasanna, Porselvan G, Prem Kumar S e Robinlash F. "Security and Privacy Based Data Sharing in Cloud Computing". International Journal of Innovative Research in Engineering & Management 5, n. 1 (gennaio 2018): 42–49. http://dx.doi.org/10.21276/ijirem.2018.5.1.9.
George, Jomin, e Takura Bhila. "Security, Confidentiality and Privacy in Health of Healthcare Data". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 giugno 2019): 373–77. http://dx.doi.org/10.31142/ijtsrd23780.
Kapil, Gayatri, Alka Agrawal e R. A. Khan. "Big Data Security and Privacy Issues". Asian Journal of Computer Science and Technology 7, n. 2 (5 agosto 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Danish, Muhammad. "Big Data Security And Privacy". International Journal of Computer Trends and Technology 67, n. 5 (25 maggio 2019): 20–26. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p104.
Martucci, William C., e Jennifer K. Oldvader. "Workplace privacy and data security". Employment Relations Today 37, n. 2 (13 luglio 2010): 59–66. http://dx.doi.org/10.1002/ert.20299.
Al-Museelem, Waleed, e Chun Lin Li. "Data Security and Data Privacy in Cloud Computing". Advanced Materials Research 905 (aprile 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Eghmazi, Ali, Mohammadhossein Ataei, René Jr Landry e Guy Chevrette. "Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy". IoT 5, n. 1 (10 gennaio 2024): 20–34. http://dx.doi.org/10.3390/iot5010002.
Bourvil e Levi. "Multi-Level Trust Privacy Preserving Data Mining to Enhance Data Security and Prevent Leakage of the Sensitive Data". Bonfring International Journal of Industrial Engineering and Management Science 7, n. 2 (30 maggio 2017): 21–25. http://dx.doi.org/10.9756/bijiems.8327.
Smith, J. H., e JS Horne. "Data privacy and DNA data". IASSIST Quarterly 47, n. 3-4 (14 dicembre 2023): 1–3. http://dx.doi.org/10.29173/iq1094.
Yang, Jing, Lianwei Qu e Yong Wang. "Multidomain Fusion Data Privacy Security Framework". Wireless Communications and Mobile Computing 2021 (20 dicembre 2021): 1–26. http://dx.doi.org/10.1155/2021/8492223.
Kumar, Raj, e Sushma Pal. "Data security and privacy through stenography". Global Sci-Tech 10, n. 2 (2018): 98. http://dx.doi.org/10.5958/2455-7110.2018.00017.4.
Taitsman, Julie K., Christi Macrina Grimm e Shantanu Agrawal. "Protecting Patient Privacy and Data Security". New England Journal of Medicine 368, n. 11 (14 marzo 2013): 977–79. http://dx.doi.org/10.1056/nejmp1215258.
Yan, Zheng, Willy Susilo, Elisa Bertino, Jun Zhang e Laurence T. Yang. "AI-driven data security and privacy". Journal of Network and Computer Applications 172 (dicembre 2020): 102842. http://dx.doi.org/10.1016/j.jnca.2020.102842.
Xiang, Yang, Man Ho Au e Miroslaw Kutylowsky. "Security and privacy in big data". Concurrency and Computation: Practice and Experience 28, n. 10 (31 marzo 2016): 2856–57. http://dx.doi.org/10.1002/cpe.3796.
Mandal, Sanjeev Kumar, Amit Sharma, Santosh Kumar Henge, Sumaira Bashir, Madhuresh Shukla e Asim Tara Pathak. "Secure data encryption key scenario for protecting private data security and privacy". Journal of Discrete Mathematical Sciences and Cryptography 27, n. 2 (2024): 269–81. http://dx.doi.org/10.47974/jdmsc-1881.
Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan e Yong Ren. "Information Security in Big Data: Privacy and Data Mining". IEEE Access 2 (2014): 1149–76. http://dx.doi.org/10.1109/access.2014.2362522.
Wu, Xuanting, e Yi Chen. "Research on Personal Data Privacy Security in the Era of Big Data". Journal of Humanities and Social Sciences Studies 4, n. 3 (6 settembre 2022): 228–35. http://dx.doi.org/10.32996/jhsss.2022.4.3.24.
Liu, Jinyang. "An overview of big data mining and data privacy protection technologies". Applied and Computational Engineering 21, n. 1 (23 ottobre 2023): 187–92. http://dx.doi.org/10.54254/2755-2721/21/20231143.
Harbola, Aditya. "Use of data auditing for encrypted data stored in cloud environment". Mathematical Statistician and Engineering Applications 70, n. 1 (31 gennaio 2021): 293–302. http://dx.doi.org/10.17762/msea.v70i1.2311.
Kumar, K. Praveen. "Efficient Encryption Algorithm for Data Security in Big Data Cloud Environment". International Journal for Research in Applied Science and Engineering Technology 9, n. 11 (30 novembre 2021): 1127–31. http://dx.doi.org/10.22214/ijraset.2021.38995.
Livshitz, Ilya. "Data privacy assurance for remote work". Energy Safety and Energy Economy 1 (febbraio 2022): 57–62. http://dx.doi.org/10.18635/2071-2219-2022-1-57-62.
Shahid, Arsalan, Thien-An Ngoc Nguyen e M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications". Sensors 21, n. 7 (28 marzo 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Gatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar e Sanket Ghadge. "Survey on Medical Data Storage Systems". International Journal of Soft Computing and Engineering 11, n. 1 (30 settembre 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Thanh Chi Phan e Hung Chi Tran. "Consideration of Data Security and Privacy Using Machine Learning Techniques". International Journal of Data Informatics and Intelligent Computing 2, n. 4 (19 dicembre 2023): 20–32. http://dx.doi.org/10.59461/ijdiic.v2i4.90.
J A, Smitha, Rakshith G Raj, Sumanth J Samuel e Pramath P Yaji. "Security Measures of Textual Data". International Journal of Innovative Research in Information Security 9, n. 03 (23 giugno 2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Chan, Tom, Concetta Tania Di Iorio, Simon De Lusignan, Daniel Lo Russo, Craig Kuziemsky e Siaw-Teng Liaw. "UK National Data Guardian for Health and Care’s Review of Data Security: Trust, better security and opt-outs". Journal of Innovation in Health Informatics 23, n. 3 (20 dicembre 2016): 627. http://dx.doi.org/10.14236/jhi.v23i3.909.
Qin, Peng, Wei Li e Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center". Wireless Communications and Mobile Computing 2022 (31 agosto 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
N.Maniam, Jacentha, e Dalbir Singh. "TOWARDS DATA PRIVACY AND SECURITY FRAMEWORK IN BIG DATA GOVERNANCE". International Journal of Software Engineering and Computer Systems 6, n. 1 (31 maggio 2020): 41–51. http://dx.doi.org/10.15282/ijsecs.6.1.2020.5.0068.
Yao, Lu. "Holistic Data Security: A Balanced Approach to Data and Privacy". Információs Társadalom 23, n. 4 (31 dicembre 2023): 102. http://dx.doi.org/10.22503/inftars.xxiii.2023.4.7.
Shobha Rani, P., e Vigneswari D. "SECURITY AND PRIVACY IN BIG DATA ANALYTICS". International Journal on Intelligent Electronic Systems 10, n. 2 (2016): 32–35. http://dx.doi.org/10.18000/ijies.30155.
Atoum, Ibrahim A., e Ismail M. Keshta. "Big data management: Security and privacy concerns". International Journal of ADVANCED AND APPLIED SCIENCES 8, n. 5 (maggio 2021): 73–83. http://dx.doi.org/10.21833/ijaas.2021.05.009.
Akinwunmi, O. O., S. A. Onashoga e O. Folorunso. "Employing differential privacy for big data security". Journal of Computer Science and Its Application 26, n. 2 (11 febbraio 2020): 134. http://dx.doi.org/10.4314/jcsia.v26i2.13.
Guan, Yunguo, Jun Shao, Guiyi Wei e Mande Xie. "Data Security and Privacy in Fog Computing". IEEE Network 32, n. 5 (settembre 2018): 106–11. http://dx.doi.org/10.1109/mnet.2018.1700250.
Matturdi, Bardi, Xianwei Zhou, Shuai Li e Fuhong Lin. "Big Data security and privacy: A review". China Communications 11, n. 14 (2014): 135–45. http://dx.doi.org/10.1109/cc.2014.7085614.
Win, Khin Than, e Willy Susilo. "Information security and privacy of health data". International Journal of Healthcare Technology and Management 7, n. 6 (2006): 492. http://dx.doi.org/10.1504/ijhtm.2006.010413.
Li, Yan, Young-Sik Jeong, Byeong-Seok Shin e Jong Hyuk Park. "Crowdsensing Multimedia Data: Security and Privacy Issues". IEEE MultiMedia 24, n. 4 (ottobre 2017): 58–66. http://dx.doi.org/10.1109/mmul.2017.4031306.
SIMPSON, ROY L. "Ensuring Patient Data, Privacy, Confidentiality and Security". Nursing Management (Springhouse) 25, n. 7 (luglio 1994): 18???22. http://dx.doi.org/10.1097/00006247-199407000-00004.
priya.E, Shanmuga, e R. Kavi tha. "Big Data Security and Privacy- A Survey". International Journal of Computer Trends and Technology 49, n. 3 (25 luglio 2017): 150–54. http://dx.doi.org/10.14445/22312803/ijctt-v49p123.
Bertino, Elisa. "Editorial: Introduction to Data Security and Privacy". Data Science and Engineering 1, n. 3 (settembre 2016): 125–26. http://dx.doi.org/10.1007/s41019-016-0021-1.
Брижко, В. М., e В. Г. Пилипчук. "Privacy, confidentiality and security of personal data". INFORMATION AND LAW, n. 1(32) (20 febbraio 2020): 33–46. http://dx.doi.org/10.37750/2616-6798.2020.1(32).200304.
T.K, Adarsh, e R. Jebakumar Dr. "Security & privacy in IoT Data Provenance". International Journal of Engineering and Technology 10, n. 3 (30 giugno 2018): 843–47. http://dx.doi.org/10.21817/ijet/2018/v10i3/181003085.
Sun, Yunchuan, Junsheng Zhang, Yongping Xiong e Guangyu Zhu. "Data Security and Privacy in Cloud Computing". International Journal of Distributed Sensor Networks 10, n. 7 (gennaio 2014): 190903. http://dx.doi.org/10.1155/2014/190903.
Pant, Abhishek. "Importance of Data Security and Privacy Compliance". International Journal for Research in Applied Science and Engineering Technology 11, n. 11 (30 novembre 2023): 1561–65. http://dx.doi.org/10.22214/ijraset.2023.56862.
Ramachandra, Mohan Naik, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu e Kivudujogappa Lingappa Hemalatha. "An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard". Big Data and Cognitive Computing 6, n. 4 (26 settembre 2022): 101. http://dx.doi.org/10.3390/bdcc6040101.