- private information
- 1) индивидуальная (личная) информация2) закрытая информация
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Private Information Retrieval — (PIR) ist ein kryptographisches Primitiv, das ein Protokoll modelliert, bei dem eine Anfrage an eine Datenbank gestellt und auch beantwortet werden kann, ohne dass die Datenbank Aussagen über den angeforderten Eintrag machen kann. Modellierung… … Deutsch Wikipedia
Private information retrieval — In cryptography, a private information retrieval (PIR) protocol allows a user to retrieve an item from a server in possession of a database without revealing which item she is retrieving. PIR is a weaker version of 1 out of n oblivious transfer,… … Wikipedia
Information economics — or the economics of information is a branch of microeconomic theory that studies how information affects an economy and economic decisions. Information has special characteristics. It is easy to create but hard to trust. It is easy to spread but… … Wikipedia
Information access — is an area of informatics and library science which concerns ensuring free and open access to information. Information access covers many issues such as copyright, open source, privacy, and security. Provision was made in copyright and patent law … Wikipedia
Information sensitivity — Sensitive information is information or knowledge that might result in loss of an advantage or level of security if revealed (disclosed) to others who might have low or unknown trustability and/or indeterminable or hostile intentions.Loss, misuse … Wikipedia
Information asymmetry — In economics and contract theory, information asymmetry deals with the study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions which can sometimes cause… … Wikipedia
Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Private landowner assistance programs — are available throughout the U.S. for landowners interested in maintaining, developing, improving and protecting wildlife on their property. Each state provides various programs that assist landowners in agriculture, forestry and conserving… … Wikipedia
Private equity in the 1990s — relates to one of the major periods in the history of private equity and venture capital. Within the broader private equity industry, two distinct sub industries, leveraged buyouts and venture capital experienced growth along parallel although… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia