security, privacy, & trust in modern data management

467 400 0
security, privacy, & trust in modern data management

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... privacy-enhancing technologies Thanks to the same trends described above, data mining technologies are becoming increasingly used Organizations are creating large databases that record information about their customers This information is analyzed to extract valuable nonobvious information for their businesses However, these techniques are particularly vulnerable to misuse and revealing of individual data records... developing its own privacy principles On the basis of the old OECD privacy principles, the APEC is trying to modernize them and make them better suited for application in today’s day and age, as well as in their different (political) cultures The leading principle in the APEC privacy principles is 2 Privacy in the Law 15 the obligation not to harm the individual when processing his data Although this principle... concept of ambient intelligence Furthermore, the chapter explains the organization of the book, describing which issues and related technologies are addressed by which chapters of the book 1.1 Introduction This book addresses security, privacy and trust issues in modern data management in a world where several aspects of ubiquitous computing and ambient intelligence visions are emerging In the sequel,... web applications to inject malicious SQL queries Databases are facing insider threats as key individuals (often administrators) control all sensitive information and infrastructure Chapter 7 provides most relevant concepts of database security, discusses their usage in prevalent database management systems, such as Oracle, DB2, and MySQL, and covers a number of challenges including the ones mentioned... problematic in the ambient world With the increased use of sensor technologies, data collection becomes automatic This means that the principles of collection limitation and purpose specification will become irrelevant in most instances Also the openness and accountability principles will become increasingly problematic when data collection becomes increasingly invisible, as data collection devices shrink (“smart... understanding of such information, and his actions and decisions based on such information Especially when using technology, the individual using it should be made aware of its risks and the ways to protect his privacy However, the individual’s failure to protect his privacy, informed or not, for instance because he forgot to install a password, to use a firewall, or just to close the curtains in the evening,... legitimate business needs or legitimate public interest, which overrides the (privacy) interests of the individual2 Using data for other purposes (including disclosure of data to third parties) is in principle not allowed However, so-called secondary use is sometimes allowed if the purpose for which the data have been collected and the purpose for which the data will be used are not incompatible3... collection, (uncontrolled) processing, and often even distribution of personal data and sensitive information With ubiquitous connectivity, people are increasingly using electronic technologies in business-to-consumer and business-to-business settings Examples are financial transactions, credit card payments, business transactions, email, document exchange, and even management of personal health records... or removal of the data Note that access could be granted in many ways: either by allowing the individual to retrieve the data from the system himself (which requires extra security measures such as identity verification and authentication), or by providing the individual with a copy or summary overview of the data The disclosed data cannot include data about other individuals The individual also has... technologies should enable new services in the open environment of the future Trust management is an important mechanism closely related to security that supports interoperation, 1 Privacy and Security Issues in a Digital World 5 exactly in this open environment Therefore, trust management systems are becoming increasingly important and getting more and attention In Chap 8, state-of-the-art systems are . book addresses security, privacy and trust issues in modern data manage- ment in a world where several aspects of ubiquitous computing and ambient intelligence visions are emerging. In the sequel,. privacy-enhancing technologies. Thanks to the same trends described above, data mining technologies are becoming increasingly used. Organizations are creating large databases that record information. all kinds of information, including user behavior, in order to act in an intelligent and adaptive way. Although cryptography and security techniques have been around for quite some time, emerging

Ngày đăng: 25/03/2014, 12:08

Mục lục

  • cover-image-large.jpg

  • front-matter.pdf

  • front-matter_001.pdf

  • fulltext.pdf

  • fulltext_001.pdf

  • fulltext_002.pdf

  • front-matter_002.pdf

  • fulltext_003.pdf

  • fulltext_004.pdf

  • fulltext_005.pdf

  • fulltext_006.pdf

  • fulltext_007.pdf

  • fulltext_008.pdf

  • fulltext_009.pdf

  • front-matter_003.pdf

  • fulltext_010.pdf

  • fulltext_011.pdf

  • fulltext_012.pdf

  • fulltext_013.pdf

  • fulltext_014.pdf

Tài liệu cùng người dùng

Tài liệu liên quan