{"title":"个人数据的存储和管理采用纠错码和椭圆曲线代理签名算法","authors":"Aditya Joshi","doi":"10.31713/mcit.2019.23","DOIUrl":null,"url":null,"abstract":"Recently personal data storage and management have become one of the most important issues in the field of information technologies. 2018 was the year when well-known GDPR was issued which stated general personal data protection regulations. It’s very important to study methods and tools which can enhance the security of information systems processing personal data. Distributed data storages are widely used for fault tolerance as well as cryptography is used for access control.","PeriodicalId":275585,"journal":{"name":"Modeling, Control and Information Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Personal data storage and management using error correction codes and elliptic curves proxy signature algorithm\",\"authors\":\"Aditya Joshi\",\"doi\":\"10.31713/mcit.2019.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently personal data storage and management have become one of the most important issues in the field of information technologies. 2018 was the year when well-known GDPR was issued which stated general personal data protection regulations. It’s very important to study methods and tools which can enhance the security of information systems processing personal data. Distributed data storages are widely used for fault tolerance as well as cryptography is used for access control.\",\"PeriodicalId\":275585,\"journal\":{\"name\":\"Modeling, Control and Information Technologies\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modeling, Control and Information Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31713/mcit.2019.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modeling, Control and Information Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31713/mcit.2019.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Personal data storage and management using error correction codes and elliptic curves proxy signature algorithm
Recently personal data storage and management have become one of the most important issues in the field of information technologies. 2018 was the year when well-known GDPR was issued which stated general personal data protection regulations. It’s very important to study methods and tools which can enhance the security of information systems processing personal data. Distributed data storages are widely used for fault tolerance as well as cryptography is used for access control.