Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  data anonymization
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The article presents an approach to data anonymization with the use of generally available tools. The focus is put on the practical aspects of using open‐source tools in conjunction with programming libraries provided by suppliers of industrial control systems. This universal ap‐ proach shows the possibilities of using various operating systems as a platform for process data anonymization. An additional advantage of the described approach is the ease of integration with various types of advanced data analysis tools based both on the out‐of‐the‐box approach (e.g., business intelligence tools) as well as customized solutions. The discussed case describes the anonymiza‐ tion of data for the needs of sensitive analysis by a wider group of recipients during the construction of a predictive model used to support decisions.
PL
Opisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono w nim wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody ich ochrony przez implementację usług prywatności na urządzeniu SBC, kontrolującym sesje komunikacyjne w sieciach opartych na protokole internetowym IP.
EN
In this article, there are described the results of research concerning the analysis of telecommunication system, based on VoIP technology, in the context of the legal requirements introduced by General Data Protection Regulation (GDPR). There are presented the analysis results of sample IP PBX system, called Asterisk, and SIP signalling protocol used in this system, paying special attention to personal data processing. There are also shown the methods of data protection by implementing of privacy services on the SBC device which controls communication sessions in networks based on Internet Protocol.
3
Content available remote Privacy and Security of User’s Sensitive Data: A Viable Analysis
EN
Big data is a collection of large amount of data. Big Data is known for any collection of data sets which is enormous and intricate that it becomes challenging to process using on-hand database management tools or traditional data processing applications. Because data stored in these days are too large in enormous in size, Security and privacy of user's sensitive data is a great challenge in this era. There are too many methods and techniques are introduced in past decades for storing and protecting the user's sensitive data such as cryptographically techniques or anonymization method which derive to hiding the sensitive data. While the anonymization techniques cannot fulfill requirements of preserving privacy of sensitive data. So we require a system of techniques, that the sensitive information can be protected from hacker.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.