X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Patent (154) 154
Conference Proceeding (76) 76
Journal Article (49) 49
Book Chapter (23) 23
Publication (13) 13
Book / eBook (7) 7
Newspaper Article (6) 6
Web Resource (2) 2
Reference (1) 1
Report (1) 1
Trade Publication Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
physics (121) 121
calculating (118) 118
computing (118) 118
counting (118) 118
electric digital data processing (98) 98
electric communication technique (77) 77
electricity (77) 77
transmission of digital information, e.g. telegraphiccommunication (73) 73
privacy (47) 47
cloud computing (44) 44
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (34) 34
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (34) 34
accountability (31) 31
computer science (29) 29
security (21) 21
computer communication networks (14) 14
law (14) 14
management of computing and information systems (14) 14
data protection (12) 12
computer science, theory & methods (11) 11
information systems applications (11) 11
computers and society (10) 10
data encryption (10) 10
data privacy (10) 10
handling record carriers (10) 10
presentation of data (10) 10
recognition of data (10) 10
record carriers (10) 10
checking-devices (9) 9
cloud (9) 9
coin-freed or like apparatus (9) 9
datensicherung (9) 9
policy enforcement (9) 9
[ info ] computer science [cs] (8) 8
computer security (8) 8
information storage (8) 8
information storage and retrieval (8) 8
information storage based on relative movement between recordcarrier and transducer (8) 8
encryption (7) 7
governance (7) 7
risk (7) 7
security measures (7) 7
telephonic communication (7) 7
business (6) 6
computers (6) 6
criminal investigations (6) 6
data security (6) 6
internet (6) 6
privacy policies (6) 6
trust (6) 6
compliance (5) 5
computer networks (5) 5
context (5) 5
decision support (5) 5
operating systems (5) 5
protection (5) 5
algorithm analysis and problem complexity (4) 4
amusements (4) 4
artificial intelligence (4) 4
card, board, or roulette games (4) 4
cloud-computing (4) 4
computer science, hardware & architecture (4) 4
computer science, software engineering (4) 4
computer system implementation (4) 4
employees (4) 4
executives (4) 4
games (4) 4
games not otherwise provided for (4) 4
human necessities (4) 4
indoor games using small moving playing bodies (4) 4
information systems (4) 4
information technology (4) 4
mathematical models (4) 4
monitoring (4) 4
performance and reliability (4) 4
pictorial communication, e.g. television (4) 4
policies (4) 4
policy hierarchy (4) 4
policy refinement (4) 4
privacy impact assessment (4) 4
provision (4) 4
sports (4) 4
standards (4) 4
system performance and evaluation (4) 4
systems and data security (4) 4
video games (4) 4
access control (3) 3
application software (3) 3
arrangements, systems or apparatus for checking not providedfor elsewhere (3) 3
business information systems (3) 3
clouds (3) 3
computation (3) 3
computer privacy (3) 3
computer systems organization and communication networks (3) 3
computer-based information systems (3) 3
computing journals (3) 3
computing science, applications and software (3) 3
cyber security (3) 3
cybersecurity (3) 3
dams (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2013, 1. Aufl., Computer communications and networks, ISBN 1447157931, xvi, 306
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text... 
Cloud computing | Privacy | Internet | Security measures | Information technology | Computer security | Web services
Book
IEEE Internet Computing, ISSN 1089-7801, 07/2011, Volume 15, Issue 4, pp. 64 - 69
Accountability is likely to become a core concept in both the cloud and in new mechanisms that help increase trust in cloud computing. These mechanisms must be... 
cloud | Privacy | Cloud computing | Data privacy | Law | Data security | intelligent accountability | accountability | privacy | COMPUTER SCIENCE, SOFTWARE ENGINEERING | Clouds | Computation | Internet
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8788, pp. 3 - 24
Conference Proceeding
International Conference on Software Engineering 2009, ISSN 0270-5257, 05/2009, Volume 2009, Issue 18
Privacy is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. In... 
Journal Article
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, 2014, Volume 421, pp. 33 - 52
Conference Proceeding
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, 2017, Volume 505, pp. 199 - 218
Conference Proceeding
Computer, ISSN 0018-9162, 09/2011, Volume 44, Issue 9, pp. 60 - 68
Machine-readable policies can stick to data to define allowed usage and obligations as it travels across multiple parties, enabling users to improve control... 
Computers | Access control | Sticky policies | Privacy management | Privacy | Data privacy | Security and privacy | EnCoRe | Medical services | Cryptography | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | Usage | Safety and security measures | Data security | Spyware | Methods | Personal information | Mathematical models | Policies | Management
Journal Article
2010 IEEE Second International Conference on Cloud Computing Technology and Science, 11/2010, pp. 693 - 702
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources,... 
trust | Cloud computing | Privacy | Law | Computational modeling | risk | Security | Standards | Business | Risk | Trust
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 8937, pp. 3 - 42
Conference Proceeding
Computer, ISSN 0018-9162, 09/2011, Volume 44, Issue 9, p. 60
Machine-readable policies can stick to data to define allowed usage and obligations as it travels across multiple parties, enabling users to improve control... 
Computer privacy | Personal information
Journal Article
2009, Lecture Notes in Computer Science, ISBN 9783642106644, Volume 5931
The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in... 
Performance and Reliability | Computer Systems Organization and Communication Networks | Data Structures | Computer Science | Software Engineering/Programming and Operating Systems | System Performance and Evaluation | Computer System Implementation | Cloud computing | Privacy | Accountability
Book Chapter
Lecture Notes in Computer Science, ISSN 0302-9743, 2005, Volume 3477, pp. 305 - 320
This paper assesses how trusted computing technology can enhance privacy, both in the short and long term, and provides a variety of examples. In addition,... 
COMPUTER SCIENCE, THEORY & METHODS
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2011, Volume 6545, pp. 363 - 375
Conference Proceeding
Computer Systems Science and Engineering, ISSN 0267-6192, 2013, Volume 28, Issue 6, p. 355
Journal Article
International Journal of Cloud Computing, ISSN 2043-9989, 01/2014, Volume 3, Issue 1, pp. 94 - 124
As cloud computing evolves towards an ecosystem of service provision, there is an increasing need for users to be more in control of the services they receive... 
Cloud computing | Consents | Construction | Ecosystems | Management systems | Copyrights | Control systems | Hybrid systems
Journal Article
2003, ISBN 9780130092205, xxvi, 322
Book
2009, Lecture Notes in Computer Science, ISBN 9783642106644, Volume 5931
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also... 
Performance and Reliability | Computer Systems Organization and Communication Networks | Data Structures | Computer Science | Software Engineering/Programming and Operating Systems | System Performance and Evaluation | Computer System Implementation | Cloud computing | Privacy
Book Chapter
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 8185, pp. 414 - 433
Conference Proceeding
Innovation: The European Journal of Social Science Research: Technology and Privacy, ISSN 1351-1610, 03/2013, Volume 26, Issue 1-2, pp. 7 - 35
Contemporary developments in information and communication technologies make "command and control"-based legislation, for example, EU Directive 95/46/EC, a... 
cloud | data protection | privacy | cloud computing | accountability | MODEL | SOCIOLOGY | Privacy | Cloud computing | Information technology | Risk assessment | Legislation | Accountability
Journal Article
International Journal of Trust Management in Computing and Communications, ISSN 2048-8378, 01/2013, Volume 1, Issue 1, pp. 52 - 72
Accountability is an important but complex notion that encompasses the obligation to act as a responsible steward of the personal information of others, to... 
Cloud computing | Trustworthiness | Computation | Legal | Chains | Internet | Remediation | Business
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.