Narrow your search

Library

ULB (44)

Vlaams Parlement (44)

KU Leuven (42)

ULiège (42)

UCLL (36)

Odisee (35)

Thomas More Kempen (34)

Thomas More Mechelen (34)

UGent (34)

VIVES (34)

More...

Resource type

book (37)

periodical (7)


Language

English (34)

French (4)

German (4)

Spanish (1)

Undetermined (1)


Year
From To Submit

2023 (5)

2022 (4)

2021 (1)

2020 (2)

2019 (1)

More...
Listing 1 - 10 of 44 << page
of 5
>>
Sort by

Book
Mobile Health Technologies for Ambient Assisted Living and Healthcare
Author:
ISBN: 3036570276 3036570268 Year: 2023 Publisher: Basel : MDPI,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields
Authors: --- ---
ISBN: 9811536546 9811536538 Year: 2020 Publisher: Singapore Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.


Periodical
Management & datascience.
Author:
ISSN: 25557017 25557033 Year: 2017 Publisher: Paris : Management & Datascience,


Book
Identités numériques : Expressions et traçabilité

Loading...
Export citation

Choose an application

Bookmark

Abstract

À l'ère d'Internet, l'expression de nos identités numériques est prise en porte-à-faux. D'un côté, l'invention par les citoyens-internautes de nouvelles modalités d'expression et de revendications identitaires, individuelles et collectives sont susceptibles de renforcer le lien social et l'existence démocratique. D'un autre côté, la propension de contrôle de ces identités à des fins économiques et politiques s'accroît via la captation, la fidélisation et la traçabilité des profils. Répression et surveillance de nos comportements numériques semblent plus que jamais d'actualité. Comment maîtriser ses identités numériques ? Peut-on être personne sur le réseau ? Peut-on effacer ses traces ? Que faire de tous nos mots de passe et identifiants ? Ce volume des Essentiels d'Hermès propose de mettre en lumière les ressorts et dilemmes de la présence en ligne et de l'« être ensemble », ou autrement dit de la communication à l'ère numérique.


Book
The Privacy Engineer's Manifesto : Getting from Policy to Code to QA to Value
Authors: --- ---
ISBN: 1430263563 1430263555 Year: 2014 Publisher: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI.

Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
Authors: ---
ISBN: 0833035991 0833034340 9780833035998 9780833034342 Year: 2003 Publisher: Santa Monica, CA : Rand,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Understanding an organization?s reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.


Book
Building-blocks of a data protection revolution : the uneasy case for blockchain technology to secure privacy and identity
Author:
ISBN: 3845294027 3848752220 Year: 2018 Publisher: Nomos Verlagsgesellschaft mbH & Co. KG

Loading...
Export citation

Choose an application

Bookmark

Abstract

The General Data Protection Regulation (GDPR) replaced the old and battered Data Protection Directive on 25 May 2018 after a long-drawn reform. The rapidly evolving technological landscape will test the ability of the GDPR to effectively achieve the goals of protecting personal data and the free movement of data. This book proposes a technological supplement to achieve the goal of data protection as enshrined in the GDPR. The proposal comes in the form of digital identity management platforms built on blockchain technology. However, the very structure of blockchain poses some significant challenges in terms of compatibility with the GDPR. Accordingly, the claim of GDPR being a technologically neutral legislation is examined. The compatibility of a blockchain-based solution is scrutinised on the parameters of data protection principles like accountability, data minimisation, control and data protection by design in conjunction with the right to be forgotten and right to data portability.


Book
Qu'est-ce que l'identité numérique? : enjeux, outils, méthodologies
Author:
ISBN: 9782821813380 9782821813373 Year: 2013 Publisher: OpenEdition Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Qu’est-ce que l’identité numérique et l’e-réputation ? Cette question se pose aujourd’hui dans le cadre de l'écosystème internet pour les usages individuels et collectifs. Cet ouvrage présente de manière accessible l'état de la recherche sur ces questions et propose un tour d'horizon des enjeux fondamentaux à maîtriser pour pouvoir garder le contrôle sur sa présence en ligne ou sur celle de son organisation. Ce livre s'adresse à ceux qui, soucieux de découvrir la richesse de cette problématique, aux entreprises, organisations et collectivités à la recherche d'une méthodologie et de bonnes pratiques sur ces questions, ainsi qu'à toute personne qui s'est déjà, ne serait-ce qu'une fois, posé la question de savoir si la publication d'une information, d'une vidéo, d'une photographie, d'un statut Facebook, ne risquait pas de lui porter un jour préjudice, à lui, à l'un de ses proches ou à son employeur. Et surtout, ce livre s'adresse à toutes les personnes qui ne se sont jamais posées cette question. Cet ouvrage a été réalisé avec le soutien du Labex Hastec.


Book
Building the Infrastructure for Cloud Security : A Solutions View
Authors: ---
ISBN: 1430261463 1430261455 Year: 2014 Publisher: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation.

Listing 1 - 10 of 44 << page
of 5
>>
Sort by