TITLE

Untitled

AUTHOR(S)
Grant, Ian
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/20/2007, p97
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article informs that the European Commission (EC)--amid growing concerns over online privacy--is looking to the information technology (IT) sector to develop privacy enhancing technologies (Pets), which give users control over how their data is used. One of the technologies the EC is looking for is encrypted biometric access systems that allow the use of a fingerprint to authenticate an individual's identity, but do not retain the actual fingerprint. As reported, EC is also looking for computer software that allows browsers to detect automatically the privacy policy of Web sites and compares it to the preferences expressed by the user, highlighting any clashes.
ACCESSION #
27962748

 

Related Articles

  • Microsoft plans better security for Explorer. Goodwin, Bill // Computer Weekly;2/22/2005, p8 

    The article reports that Microsoft Corp. is spending a third of its 3.2 billion research and development budget on IT security. Speaking at the RSA conference, Microsoft chairman Bill Gates said security concerns were harming the potential of the Internet to provide new services to the public....

  • The Authentication Imperative. Sullivan, Roger K. // U.S. Banker;Jun2006, Vol. 116 Issue 6, p46 

    The article comments on the effort of the Liberty Alliance to build the Identity Strong Authentication Framework (ID-SAFE) aimed at improving Internet security. ID-SAFE allows hardware and software tokens, smart cards and biometrics to interoperate across organizations, networks and vertical...

  • Look after your network. Ecott, Tim // Computer Weekly;9/2/2003, p25 

    The article discusses issue of computer network security for the high technology industry. The experience in the industry has shown that businesses are becoming complacent and failing to test the resolve of their security measures. The importance of measures such as virtual private networks,...

  • DOWNTIME.  // Computer Weekly;5/17/2005, p64 

    This article presents information on developments and activities related to information technology (IT) firms. An IT manager, who will remain anonymous, kitted out his house with a state-of-the-art wireless home network, including security and content filtering for his children. However, he told...

  • IN BRIEF.  // Computer Weekly;9/27/2005, p4 

    Presents news briefs related to the computer industry of Great Britain. Release of a new version of the Firefox browser by the Mozilla Foundation used to fix widely reported critical security bugs; Information that British Telecom PLC will spend more than £200m on information technology...

  • spectrum. Peterson, Shane // Government Technology;Oct2005, Vol. 18 Issue 10, p10 

    Presents updates on information technology and telecommunication in the U.S. as of October 1, 2005. Market share of Firefox in the Web browser marker; Result of a study on project portfolio management; List of myths on computer network security.

  • Avoid browser nightmares. Finetti, Mario // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2010, p46 

    The article offers tips for managing a uniform, updated and secured enterprise web browsers in Great Britain in November 2010. It emphasizes the importance of handling a single browser configuration in lessening attempts to handling enterprise web applications. The author explains the advantages...

  • Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers. Ramesh, G.; Umarani, R. // International Journal of Information Technology & Computer Scien;Nov2012, Vol. 4 Issue 12, p60 

    The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. We have proposed a Web programming...

  • Is My Communication Really Secure? Jungen, Don // Facts & Findings;Nov/Dec2013, Vol. 40 Issue 3, p24 

    The article offers suggestions for using secure web communication which includes electronic mails, internet browsing, and communication protocol used. It advices to use Hypertext Transfer Protocol Secure (HTTPS) while connecting to email services such as Goggle and Hotmail. It recommends...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics