Добірка наукової літератури з теми "Confidentiality of sources"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Confidentiality of sources".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Confidentiality of sources"
Emslie, J. A., and P. Christie. "Confidentiality for doctors with AIDS. Official sources maintained confidentiality." BMJ 307, no. 6903 (August 28, 1993): 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.
Повний текст джерелаHarala, Riitta, and Anna-Leena Reinikainen. "Confidentiality in the use of administrative data sources." Statistical Journal of the United Nations Economic Commission for Europe 13, no. 4 (December 1, 1996): 361–68. http://dx.doi.org/10.3233/sju-1996-13404.
Повний текст джерелаAlexander, Laurence B. "Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources." Newspaper Research Journal 14, no. 3-4 (June 1993): 45–59. http://dx.doi.org/10.1177/073953299301400306.
Повний текст джерелаWOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.
Повний текст джерелаGassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (March 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.
Повний текст джерелаMcHone-Chase, Sarah. "Sources: Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers." Reference & User Services Quarterly 49, no. 1 (September 1, 2009): 104. http://dx.doi.org/10.5860/rusq.49n1.104.
Повний текст джерелаFernandez, Joseph M. "Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts." Asia Pacific Media Educator 27, no. 2 (October 25, 2017): 202–18. http://dx.doi.org/10.1177/1326365x17728822.
Повний текст джерелаAinsworth, Frank, and Patricia Hansen. "Confidentiality in child protection cases Who benefits?" Children Australia 35, no. 3 (2010): 11–17. http://dx.doi.org/10.1017/s1035077200001127.
Повний текст джерелаSHAHBAZYAN, K. "Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development: practices of EU and countries of the world." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.
Повний текст джерелаBiałkowska, Paula Maria. "Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America." Review of European and Comparative Law 45, no. 2 (June 16, 2021): 77–103. http://dx.doi.org/10.31743/recl.11456.
Повний текст джерелаДисертації з теми "Confidentiality of sources"
Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Повний текст джерелаFreedom of expression and communication is a fundamental right, and one of the key elements of a democracy. For this reason, it has been protected for a long time. However, one of its pillars, the protection of the confidentiality of a journalist's sources, has for a long time been ignored, and even today is not completely recognized in France. This state of affairs is mainly due to political factors. This refusal to acknowledge, and this partial and tardy recognition, can be largely explained by the fact that investigative reporting, in the public interest, can potentially target politicians. Furthermore, even a partial recognition of this right can be neutralised by increasingly sophisticated modern methods of surveillance, such as the Pegasus computer program. Journalists find themselves on an uneven playing field when they seek to take on public authorities, big business or indeed organised criminal groups who want to uncover the sources behind an investigative report. This is why the French system falls short, despite a ruling by the European Court of Human Rights (ECHR) in favour of protecting journalists' sources. However, a proper protection of these sources is well within the bounds of possibility. One has only to look as far as Belgium, where an effective and exemplary system is in place. An overhaul of the French system is well overdue, because, as the ECHR puts it, journalists are the vanguards of a democracy
Van, Assche Gilles. "Information-Theoretic aspects of quantum key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211050.
Повний текст джерелаLa distribution quantique de clés est une technique cryptographique permettant l'échange de clés secrètes dont la confidentialité est garantie par les lois de la mécanique quantique. Le comportement particulier des particules élémentaires est exploité. En effet, en mécanique quantique, toute mesure sur l'état d'une particule modifie irrémédiablement cet état. En jouant sur cette propriété, deux parties, souvent appelées Alice et Bob, peuvent encoder une clé secrète dans des porteurs quantiques tels que des photons uniques. Toute tentative d'espionnage demande à l'espion, Eve, une mesure de l'état du photon qui transmet un bit de clé et donc se traduit par une perturbation de l'état. Alice et Bob peuvent alors se rendre compte de la présence d'Eve par un nombre inhabituel d'erreurs de transmission.
L'information échangée par la distribution quantique n'est pas directement utilisable mais doit être d'abord traitée. Les erreurs de transmissions, qu'elles soient dues à un espion ou simplement à du bruit dans le canal de communication, doivent être corrigées grâce à une technique appelée réconciliation. Ensuite, la connaissance partielle d'un espion qui n'aurait perturbé qu'une partie des porteurs doit être supprimée de la clé finale grâce à une technique dite d'amplification de confidentialité.
Cette thèse s'inscrit dans le contexte de la distribution quantique de clé où les porteurs sont des états continus de la lumière. En particulier, une partie importante de ce travail est consacrée au traitement de l'information continue échangée par un protocole particulier de distribution quantique de clés, où les porteurs sont des états cohérents de la lumière. La nature continue de cette information implique des aménagements particuliers des techniques de réconciliation, qui ont surtout été développées pour traiter l'information binaire. Nous proposons une technique dite de réconciliation en tranches qui permet de traiter efficacement l'information continue. L'ensemble des techniques développées a été utilisé en collaboration avec l'Institut d'Optique à Orsay, France, pour produire la première expérience de distribution quantique de clés au moyen d'états cohérents de la lumière modulés continuement.
D'autres aspects importants sont également traités dans cette thèse, tels que la mise en perspective de la distribution quantique de clés dans un contexte cryptographique, la spécification d'un protocole complet, la création de nouvelles techniques d'amplification de confidentialité plus rapides à mettre en œuvre ou l'étude théorique et pratique d'algorithmes alternatifs de réconciliation.
Enfin, nous étudions la sécurité du protocole à états cohérents en établissant son équivalence à un protocole de purification d'intrication. Sans entrer dans les détails, cette équivalence, formelle, permet de valider la robustesse du protocole contre tout type d'espionnage, même le plus compliqué possible, permis par les lois de la mécanique quantique. En particulier, nous généralisons l'algorithme de réconciliation en tranches pour le transformer en un protocole de purification et nous établissons ainsi un protocole de distribution quantique sûr contre toute stratégie d'espionnage.
Quantum key distribution is a cryptographic technique, which allows to exchange secret keys whose confidentiality is guaranteed by the laws of quantum mechanics. The strange behavior of elementary particles is exploited. In quantum mechnics, any measurement of the state of a particle irreversibly modifies this state. By taking advantage of this property, two parties, often called Alice and bob, can encode a secret key into quatum information carriers such as single photons. Any attempt at eavesdropping requires the spy, Eve, to measure the state of the photon and thus to perturb this state. Alice and Bob can then be aware of Eve's presence by a unusually high number of transmission errors.
The information exchanged by quantum key distribution is not directly usable but must first be processed. Transmission errors, whether they are caused by an eavesdropper or simply by noise in the transmission channel, must be corrected with a technique called reconciliation. Then, the partial knowledge of an eavesdropper, who would perturb only a fraction of the carriers, must be wiped out from the final key thanks to a technique called privacy amplification.
The context of this thesis is the quantum key distribution with continuous states of light as carriers. An important part of this work deals with the processing of continuous information exchanged by a particular protocol, where the carriers are coherent states of light. The continuous nature of information in this case implies peculiar changes to the reconciliation techniques, which have mostly been developed to process binary information. We propose a technique called sliced error correction, which allows to efficiently process continuous information. The set of the developed techniques was used in collaboration with the Institut d'Optique, Orsay, France, to set up the first experiment of quantum key distribution with continuously-modulated coherent states of light.
Other important aspects are also treated in this thesis, such as placing quantum key distribution in the context of a cryptosystem, the specification of a complete protocol, the creation of new techniques for faster privacy amplification or the theoretical and practical study of alternate reconciliation algorithms.
Finally, we study the security of the coherent state protocol by analyzing its equivalence with an entanglement purification protocol. Without going into the details, this formal equivalence allows to validate the robustness of the protocol against any kind of eavesdropping, even the most intricate one allowed by the laws of quantum mechanics. In particular, we generalize the sliced error correction algorithm so as to transform it into a purification protocol and we thus establish a quantum key distribution protocol secure against any eavesdropping strategy.
Doctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Повний текст джерелаMedeiros, Damian J. A. ""According to my sources..." A proposed constitutional framework for adjudicating reporter-source confidentiality in Canada." 2009. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=958046&T=F.
Повний текст джерелаКниги з теми "Confidentiality of sources"
Great Britain. Office of Population Censuses and Surveys. Library., ed. Privacy, confidentiality and data protection: Source works in OPCS library. London: OPCS, 1986.
Знайти повний текст джерелаJ, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.
Знайти повний текст джерелаCarlson, Matt. “Journalism on Trial”: Confidentiality and the Plame Leak Case. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0006.
Повний текст джерелаFried, Adam L., and Celia B. Fisher. Emerging Ethical and Legal Issues in Clinical Child and Adolescent Psychology. Edited by Thomas H. Ollendick, Susan W. White, and Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.9.
Повний текст джерелаVeatch, Robert M., Amy Haddad, and E. J. Last. Experimentation on Human Subjects. Edited by Robert M. Veatch, Amy Haddad, and E. J. Last. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.003.0016.
Повний текст джерелаAdams, Helen R. Protecting Intellectual Freedom and Privacy in Your School Library. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798216002253.
Повний текст джерелаVeatch, Robert M., Amy Haddad, and E. J. Last. Case Studies in Pharmacy Ethics. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.001.0001.
Повний текст джерелаPowers, Michael, and Anthony Barton. Clinical Negligence. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781526521552.
Повний текст джерелаSchanz, Stephen J., P. Wilson, and R. J. Rodrigues. Regulation of Privacy and Data Protection in the Use of Electronic Health Information: An International Perspective and Reference Source on Regulatory and Legal Issues Related to Person-identifiable Health Databases. Pan American Health Organization (PAHO), 2001.
Знайти повний текст джерелаЧастини книг з теми "Confidentiality of sources"
Pearson, Mark. "Confidentiality, secrets, sources and disclosure." In The Communicator's Guide to Media Law and Ethics, 142–74. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.
Повний текст джерелаReymond-Eniaeva, Elza. "Sources." In Towards a Uniform Approach to Confidentiality of International Commercial Arbitration, 5–27. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19003-3_2.
Повний текст джерелаSchulz, David A., and Valerie Belair-Gagnon. "6. Rescuing A Reporter’S Right To Protect The Confidentiality Of Sources." In Journalism After Snowden, edited by Emily Bell and Taylor Owen, 97–113. New York Chichester, West Sussex: Columbia University Press, 2017. http://dx.doi.org/10.7312/bell17612-009.
Повний текст джерелаGhirelli, Corinna, Samuel Hurtado, Javier J. Pérez, and Alberto Urtasun. "New Data Sources for Central Banks." In Data Science for Economics and Finance, 169–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66891-4_8.
Повний текст джерелаStenbeck, Magnus, Sonja Eaker Fält, and Jane Reichel. "Swedish Law on Personal Data in Biobank Research: Permissible But Complex." In GDPR and Biobanking, 379–94. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_21.
Повний текст джерелаBoldrin, Luca, Giovanni Paolo Sellitto, and Jaak Tepandi. "TOOP Trust Architecture." In The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Повний текст джерелаMedhane, Darshan V., and Arun Kumar Sangaiah. "Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks." In Advances in Intelligent Systems and Computing, 347–55. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_38.
Повний текст джерелаLasorsa, Dominic L. "Sources, Confidentiality of." In Encyclopedia of International Media and Communications, 193–203. Elsevier, 2003. http://dx.doi.org/10.1016/b0-12-387670-2/00267-3.
Повний текст джерелаFernandez, Joseph M. "Journalist-source confidentiality practice rules." In Journalists and Confidential Sources, 87–109. Routledge, 2020. http://dx.doi.org/10.4324/9781003035411-5.
Повний текст джерелаPearson, Mark, and Mark Polden. "Keeping secrets: Confidentiality and sources." In The Journalist’s Guide to Media Law, 311–52. Routledge, 2020. http://dx.doi.org/10.4324/9781003117995-13.
Повний текст джерелаТези доповідей конференцій з теми "Confidentiality of sources"
Tenorio, Viviane, Leonardo Souza, Maxwell Albuquerque, Rodolfo Marinho, Matteus Silva, and Andrey Brito. "Low-Cost, Practical Data Confidentiality Support for IoT Data Sources." In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046097.
Повний текст джерелаNashed, Nashaat, and Roman Fedorov. "Constitutional pronection of personal data – a case study of data confidentiality in Egyptian banks." In Development of legal systems in Russia and foreign countries: problems of theory and practice. ru: Publishing Center RIOR, 2021. http://dx.doi.org/10.29039/02061-6-201-211.
Повний текст джерелаMikštienė, Ruta, and Violeta Keršulienė. "Legal decision support system application possibility in corporate governance." In Business and Management 2016. VGTU Technika, 2016. http://dx.doi.org/10.3846/bm.2016.39.
Повний текст джерелаAbsi-Halabi, Nour J., and Ali A. Yassine. "Optimal Release Planning Using Machine Learning and Linear Integer Programming for Ideas in a Crowdsourcing Platform." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-68177.
Повний текст джерелаWeiland, Nathan T., Blake W. Lance, and Sandeep R. Pidaparti. "sCO2 Power Cycle Component Cost Correlations From DOE Data Spanning Multiple Scales and Applications." In ASME Turbo Expo 2019: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/gt2019-90493.
Повний текст джерелаRodrigues, S. S., J. O. Braga, J. M. Xavier, G. Pauli, A. M. Mata, E. Margotti, M. B. Demay, and G. D. Donatelli. "Digital Twin of Subsea Assets as a Tool for Integrity Management and Risk-Based Inspection: Challenges and Perspectives." In Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32757-ms.
Повний текст джерелаKazykhanov, A. A., D. R. Kazykhanova, and D. V. Rednikov. "Printing devices, as a source of threats to the confidentiality of information." In ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ. НИЦ «Л-Журнал», 2018. http://dx.doi.org/10.18411/lj-10-2018-191.
Повний текст джерелаKoumpan, Elizabeth, and Anna Topol. "Value-driven architecture enabling new interaction models in Society 5.0." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003765.
Повний текст джерелаNematy, Hoda. "Secure Protocol for Four D2D Scenarios." In 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111102.
Повний текст джерелаKarahasanovic, Amela. "Is it Ethical to Log Users’ Actions in Software Engineering Experiments?" In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2700.
Повний текст джерелаЗвіти організацій з теми "Confidentiality of sources"
Cantor, Amy, Heidi D. Nelson, Miranda Pappas, Chandler Atchison, Brigit Hatch, Nathalie Huguet, Brittny Flynn, and Marian McDonagh. Effectiveness of Telehealth for Women’s Preventive Services. Agency for Healthcare Research and Quality (AHRQ), June 2022. http://dx.doi.org/10.23970/ahrqepccer256.
Повний текст джерела