The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of social network and information technology, people enjoy the happy and convenient life the modern world brings. On the other hand, people suffer risk caused by privacy leakage. How to protect peoples' privacy in such an information society is a still a challenge and hot issue. It is difficult to find an excellent best of both worlds solution to protect people's sensitive...
In cloud computing, multi-tenancy applications utilize shared resources to serve multi tenants through “single instance multi-tenancy”. Applications and databases are both deployed at the platform of un-trusted service providers. Data privacy has become the biggest challenges in wider adoption of cloud computing. Specifically, data schema evolves due to on-demand customization in cloud computing....
Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy...
In recent years, a variety of privacy events emerges and bring huge losses. With the in-depth application of data mining, big data, cloud computing and other technology, privacy protection issue becomes more and more challenging. Therefore, we propose a privacy protection mechanism for sensitive group information. A reasonable counterfeit data set is constructed based on cloud model for sensitive...
As a newly software delivery model, software as a service, SaaS for short, is the best way for small and medium enterprise to adopt the newly technology. However trustworthiness is greatest challenge in the wide acceptance of SaaS. In the absence of trustworthiness in SaaS applications, data privacy is the primary and the most important issue for tenants. How to protect the data privacy when software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.