Data security

Results: 28926



#Item
451Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
452Government / Geography / Geographic data and information / Exploration of North America / Geology of the United States / San Mateo County /  California / United States Geological Survey / Geographic information system / United States Environmental Protection Agency / United States Department of Homeland Security / Open data / Geospatial

Subcommittee on Spatial Water Data Meeting Details: Date/Time: February 26, 2016, 1:00 - 3:00 PM Eastern Time Location: Teleconference only (administered from USGS Headquarters, 12201 Sunrise Valley Drive, Reston, VA 201

Add to Reading List

Source URL: acwi.gov

Language: English - Date: 2016-03-30 11:59:27
453Computer network security / Computing / Computer security / Cyberwarfare / Data security / Firewall / Network management / Managed security service / F5 Networks / Virtual security appliance

Managed Security Service – Basic Packageto be completed by customer) Dear 1-Net Customer, Please complete the attached document in its entirety and return directly your 1-Net Account Manager. ALL sectio

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:08:34
454Economy / Business / Actuarial science / Management / Security / Ledger / Risk management / Risk / Credit risk / Accounts receivable

What is 3D Ledger? 3D Ledger is an interactive Risk Management Tool that combines your Ledger Data with Creditsafe Company Data and Trade Payment Data giving you all the information you need to make smarter business deci

Add to Reading List

Source URL: www.3dledger.com

Language: English - Date: 2013-02-21 07:06:37
455Minnesota / United States

FY17 Supplemental Request Cyber Security $19 million one-time Upgrade the University’s network to improve data protection systemwide for

Add to Reading List

Source URL: govrelations.umn.edu

Language: English - Date: 2016-01-11 12:16:57
456Internet privacy / Computing / Privacy / Computer security / Data security / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P / In re Gateway Learning Corp.

Information we collect: COOKIES This website may sometimes make use of cookies especially where we are using an analytics program to monitor visitor behaviour & site usage; WHAT ARE COOKIES? Small files stored on your co

Add to Reading List

Source URL: www.easymenu.co.uk

Language: English - Date: 2015-07-06 01:02:12
457Information technology / Data management / Computing / Data steward / Information security / Data security / Backup / Holistic Data Management / Master data management

Information Technology Standard Data Management Identifier: IT-STND-001

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-09-02 12:28:52
458Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
459Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Data security / Information privacy / Medical privacy / Politics / Government

Engendering Trust: Privacy Policies and Signatures Joshua B. Gross, Jessica Sheffield, Alice Anderson, and Nan Yu The Pennsylvania State University University Park, PA 16802 , (jessicas, aea145, nxy906

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-01 23:42:33
460Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:28:28
UPDATE