The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Differential privacy is a formal mathematical standard for quantifying the degree of that individual privacy in a statistical database is preserved. To guarantee differential privacy, a typical method is adding random noise to the original data for data release. In this paper, we investigate the basic conditions of differential privacy considering the general random noise adding mechanism, and then...
Quantum computing field is evolving rapidly these days. The difference between this new field and the classical field is the extension of the main domain from just using two bits (0, 1) to a complete space which is the result of the superposition of the same mentioned bits. By applying the superposition property in the quantum algorithms, this ensures that the system is more secured than the classical...
As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive...
The development of computer development, unfortunately, and abuse of computers, or abuse of data and information that are processed modern information technologies. The mass use of computers in different circumstances, with the increasing use of telecommunication equipment by increasing the number of users, enables a growing number of thieves, and unauthorized persons (hacker) to break through the...
To many users, the data security in Software-as-a-service (SAAS) is troubling, especially the sensitive data security. In this paper, further separation of user data is adopted, allowing users choose another unrelated third-party to provide database services. And the all operations to the data in the database, such as adding, deleting, encryption, are all still directly executed by the relevant software...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.