Ensuring Research Integrity

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ensuring Data Integrity in Cloud Computing

Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with e...

متن کامل

Ensuring the Integrity of Running Java Programs

517 INTRODUCTION Computing devices are increasingly relied on to store, manipulate, transmit, and visualize data. This reliance extends to nearly all aspects of modern society, from individuals who rely on their smartphones to always be at their fingertips to organizations with vast networks and racks of servers that must always be fully functional. Such reliance poses a great risk in the event...

متن کامل

Ensuring Host Integrity With Cryptographic Provenance Verification∗

We propose a malware detection approach based on the characteristic behaviors of human users. We explore the humanmalware differences and utilize them to aid the detection of infected hosts. There are two main research challenges in this study: one is how to select characteristic behavior features, and the other is how to prevent malware forgeries. We aim to address both questions in this poster.

متن کامل

Ensuring Asset Integrity - A Risk-based Approach

There are many improvement methodologies and techniques available to improve plant reliability and availability, including such techniques as Reliability Centred Maintenance, PM Optimisation, Weibull analysis and others. However all of these techniques have significant limitations when it comes to dealing with high consequence, low probability events – those events that have potentially catastr...

متن کامل

Ensuring Media Integrity on Third-Party Infrastructures

In many heterogeneous networked applications the integrity of multimedia data plays an essential role, but is not directly supported by the application. In this paper, we propose a method which enables an individual user to detect tampering with a multimedia file without changing the software application provided by the third party. Our method is based on a combination of cryptographic signatur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Management

سال: 2016

ISSN: 0149-2063,1557-1211

DOI: 10.1177/0149206316643931