TITLE

Keep it private and secure

PUB. DATE
November 2015
SOURCE
Nebraska Farmer;Nov2015, Vol. 157 Issue 11, p6
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the aspects of sharing farm data with trusted partners and farmers, and the need for farmers to observe data privacy and security.
ACCESSION #
110722837

 

Related Articles

  • Perils in having too much information - and too little. McMillan, Virginia // New Zealand Doctor;3/26/2014, p16 

    The author reflects on the security risks of electronic health records sharing and the perils of having little patient data.

  • Three issues for Digital India to succeed.  // Express Computer;10/9/2015, p1 

    The article discusses the issues that Digital India needs to consider, which include privacy and security of data with reference to sharing digital information across borders by companies and tackling issues that arise with digital economy.

  • Replicated strips offer perks. Birchmier, Kacey // Wallaces Farmer;Feb2011, Vol. 136 Issue 2, p7 

    The article offers information on the benefits of replicated strip trials offered by Iowa-based On-Farm Network to growers. It states that the trials will provide farmers an opportunity to know several practices which could affect their farm management. Furthermore, the tests will also let them...

  • Authorization Models for Secure Information Sharing: A Survey and Research Agenda. Salim, Farzad; Reid, Jason; Dawson, Ed // ISeCure;Jul2010, Vol. 2 Issue 2, p69 

    This article presents a survey of authorisation models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as...

  • Consumerization of IT poses corporate challenge. McCLURE, TERRI // Storage Magazine;Nov2012, Vol. 11 Issue 9, p35 

    The article discusses the consumerization of information technology (IT) as one of the biggest corporate challenges as IT departments have less influence on users' choices of which devices they use. It notes that IT used to dictate the technology used by the staff to do its work, from...

  • Discrete Logarithm based (t, n) Threshold Group Signature Scheme. Mante, Ganesh // International Journal of Computer Applications;May2011, Vol. 21, p23 

    Globalization of the Internet has boosted electronic information exchange on both the personal and business levels. There is a need of the authentication of messages sent by a group of individuals to another group. A (t, n) threshold group signature scheme is a method for allowing a member of a...

  • Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing. Dhanalakshmi, M.; Balu, V. // International Journal of Computer Applications;Jun2014, Vol. 96, p7 

    Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data...

  • MEETING MEDICAL DEVICE SECURITY STANDARDS. van de Graaf, Christine // Electronics World;Mar2012, Vol. 118 Issue 1911, p20 

    The article discusses how to comply with medical device security standards that support version 1.2 of the Trusted Platform Module (TPM). It mentions concerns of risk and vulnerabilities towards information and data-sharing in the medical industry. It notes the challenges of adding reliable...

  • A Review on Approaches, Techniques and Research Challenges in Privacy Preserving Data Mining. Prakash, M.; Singaravel, G. // Australian Journal of Basic & Applied Sciences;Jul2014, Vol. 8 Issue 10, p251 

    Background: Privacy Preserving Data Mining is a fast growing new era of research due to recent advancements in information, data mining, communications and security technologies. The Privacy Preserving Data Mining's ultimate goal is to develop efficient algorithms that allow one to extract...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics