Listing 1 - 10 of 26 | << page >> |
Sort by
|
Choose an application
secure computing --- precise computing --- intelligent computing --- software --- algorithms --- applications
Choose an application
The General Data Protection Regulation (GDPR) replaced the old and battered Data Protection Directive on 25 May 2018 after a long-drawn reform. The rapidly evolving technological landscape will test the ability of the GDPR to effectively achieve the goals of protecting personal data and the free movement of data. This book proposes a technological supplement to achieve the goal of data protection as enshrined in the GDPR. The proposal comes in the form of digital identity management platforms built on blockchain technology. However, the very structure of blockchain poses some significant challenges in terms of compatibility with the GDPR. Accordingly, the claim of GDPR being a technologically neutral legislation is examined. The compatibility of a blockchain-based solution is scrutinised on the parameters of data protection principles like accountability, data minimisation, control and data protection by design in conjunction with the right to be forgotten and right to data portability.
Blockchains (Databases) --- Data protection. --- Database security. --- Data base security --- Databases --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Block chains (Databases) --- Database security --- Distributed databases --- Security measures --- Blockchain Technology --- Data Protection Revolution --- Profiling --- Data Protection --- Secure Identity --- Blockchain --- Secure Privacy --- Uneasy Code --- Building-Blocks
Choose an application
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
Data protection. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security --- Secure Date Management --- Privacy Protection --- Big Data Security --- Information Security --- Cyber Security --- Open Access --- Computer security
Choose an application
This book contains the successful invited submissions to a Special Issue of Symmetry on the subject of ""Graph Theory"". Although symmetry has always played an important role in Graph Theory, in recent years, this role has increased significantly in several branches of this field, including but not limited to Gromov hyperbolic graphs, the metric dimension of graphs, domination theory, and topological indices. This Special Issue includes contributions addressing new results on these topics, both from a theoretical and an applied point of view.
Zagreb indices --- domination --- Devaney chaos --- rotationally-symmetric convex polytopes --- topologically mixing --- geometric arithmetic index --- connectivity --- Metric dimension --- atom-bond connectivity ABC index --- distinguishing number --- gear graph --- titanium difluoride --- algorithm --- generalized gear graph --- general Randi? index --- cuprite --- atom bond connectivity index --- binary locating-domination number --- basis --- hypercyclicity --- functigraph --- complete graph --- alpha-boron nanotube --- general randi? index --- geodesics --- inverse degree index --- Hex-Derived Cage networks --- metric dimension --- dominating set --- bipartite graphs --- products of graphs --- geometric-arithmetic GA index --- direct product of graphs --- gromov hyperbolicity --- secure resolving set and secure resolving domination --- topological indices --- graph operators --- resolving set --- harmonic index --- polycyclic aromatic hydrocarbons --- ILP models --- disjointness --- topological transitivity --- Gromov hyperbolicity --- metric basis --- harmonic polynomial
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
Biometric identification --- Identification biométrique --- Periodicals --- Périodiques --- EJINGEN EPUB-ALPHA-I EPUB-PER-FT IET-E --- biometrics recognition --- biometric applications --- secure biometric storage --- ethical issues in biometrics --- machine learning --- artificial intelligence --- Biometry --- Biometry. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods
Choose an application
"The Marion Experiment combines academic research with personal accounts by prisoners to investigate solitary confinement and supermax prisons. USP Marion became a model for supermax prisons, with many other prison systems--in the U.S. and abroad--copying the special architectural and program innovations there"--
SOCIAL SCIENCE / Penology. --- SOCIAL SCIENCE / Criminology. --- Solitary confinement --- Imprisonment --- Prisons --- Administrative segregation (Prison discipline) --- Hole (Prison discipline) --- Isolation (Prison discipline) --- Secure housing units (Prison discipline) --- Security housing units (Prison discipline) --- SHU (Prison discipline) --- Special housing units (Prison discipline) --- Special management units (Prison discipline) --- Prison discipline --- Law and legislation
Choose an application
John Galsworthy first published in 1897 with a collection of short stories entitled "The Four Winds". For the next 7 years he published these and all works under his pen name John Sinjohn. It was only upon the death of his father and the publication of "The Island Pharisees" in 1904 that he published as John Galsworthy. His first play was The Silver Box, an immediate success when it debuted in 1906 and was followed by "The Man of Property" later that same year and was the first in the Forsyte trilogy. Whilst today he is far more well know as a Nobel Prize winning novelist then he was considered a playwright dealing with social issues and the class system. We publish here 'Justice' a great example of both his writing and his demonstration of how the class system worked at the time. He was appointed to the Order of Merit in 1929, after earlier turning down a knighthood, and awarded the Nobel Prize in 1932 though he was too ill to attend. John Galsworthy died from a brain tumour at his London home, Grove Lodge, Hampstead on January 31st 1933. In accordance with his will he was cremated at Woking with his ashes then being scattered over the South Downs from an aeroplane.
Prisons. --- Solitary confinement. --- English drama. --- English literature --- Administrative segregation (Prison discipline) --- Hole (Prison discipline) --- Isolation (Prison discipline) --- Secure housing units (Prison discipline) --- Security housing units (Prison discipline) --- SHU (Prison discipline) --- Special housing units (Prison discipline) --- Special management units (Prison discipline) --- Imprisonment --- Prison discipline --- Dungeons --- Gaols --- Penitentiaries --- Correctional institutions --- Prison-industrial complex
Choose an application
America's public universities educate 80% of our nation's college students. But in the wake of rising demands on state treasuries, changing demographics, growing income inequality, and legislative indifference, many of these institutions have fallen into decline. Tuition costs have skyrocketed, class sizes have gone up, the number of courses offered has gone down, and the overall quality of education has decreased significantly. Here James C. Garland draws on more than thirty years of experience as a professor, administrator, and university president to argue that a
Public universities and colleges --- Universities and colleges --- Finance. --- 378.4 <73> --- 378.4 <73> Universiteiten--Verenigde Staten van Amerika. VSA. USA --- Universiteiten--Verenigde Staten van Amerika. VSA. USA --- Finance --- public university, college, higher education, school, learning, united states of america, american culture, usa, undergraduate students, changing demographics, tuition, costs, income inequality, state government, affordability, financially secure, academia, efficiency, productivity, campus leadership, legislators, reforms, governing boards, finance, student needs.
Choose an application
There are moments when we forget how fortunate we are to have the California coast. The state is home to 1,100 miles of uninterrupted coastline defined by long stretches of beach and jagged rocky cliffs. Coastal Sage chronicles the career and accomplishments of Peter Douglas, the longest-serving executive director of the California Coastal Commission. For nearly three decades, Douglas fought to keep the California coast public, prevent overdevelopment, and safeguard habitat. In doing so, Douglas emerged as a leading figure in the contemporary American environmental movement and influenced public conservation efforts across the country. He coauthored California's foundational laws pertaining to shoreline management and conservation: Proposition 20 and the California Coastal Act. Many of the political battles to save the coast from overdevelopment and secure public access are revealed for the first time in this study of the leader who was at once a visionary, warrior, and coastal sage.
Coastal zone management --- Conservationists --- Environmentalists --- Douglas, Peter, --- Ehlers, Peter Michael, --- California Coastal Commission. --- California Coastal Zone Conservation Commission --- California. --- american conservation. --- american political movements. --- american west. --- beach. --- california coastal commission. --- california. --- californian coast. --- coastal ecosystems. --- coastline. --- conservation. --- contemporary environmental movement. --- habitat. --- insightful. --- legal system. --- ocean. --- overdevelopment. --- peter douglas. --- proposition 20. --- public coast. --- public conservation. --- rocky cliffs. --- secure public access. --- shoreline management. --- the california coastal act. --- united states of america. --- west coast.
Listing 1 - 10 of 26 | << page >> |
Sort by
|