首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   0篇
法律   5篇
中国政治   2篇
政治理论   3篇
综合类   3篇
  2018年   1篇
  2013年   1篇
  2012年   1篇
  2011年   3篇
  2010年   2篇
  2009年   4篇
  2008年   1篇
排序方式: 共有13条查询结果,搜索用时 0 毫秒
11.
随着电子身份证、电子护照、电子驾照等电子证件成为日益重要的公众个人信息的载体,并借助于电子政务基础网络和不断完善的管理体系和应用功能,电子证件日渐成为公共服务信息资源的新载体和公共服务的新趋势。本文根据政府公共服务信息资源共享的理论和RFID技术的特点,提出了基于电子证件的公共服务信息平台的技术框架体系,实现RFID技术、证件管理与政府公共服务信息资源管理三者的松耦合紧集成,并结合"大连市电子房产证信息服务平台"案例说明了框架的适用性和科学性。文章最后对推进电子证件在政府公共服务信息资源共享的制约因素和对策也进行了初步的分析和探讨。  相似文献   
12.
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists.  相似文献   
13.
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号