Ensuring Research Integrity
نویسندگان
چکیده
منابع مشابه
Ensuring Data Integrity in Cloud Computing
Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with e...
متن کاملEnsuring the Integrity of Running Java Programs
517 INTRODUCTION Computing devices are increasingly relied on to store, manipulate, transmit, and visualize data. This reliance extends to nearly all aspects of modern society, from individuals who rely on their smartphones to always be at their fingertips to organizations with vast networks and racks of servers that must always be fully functional. Such reliance poses a great risk in the event...
متن کاملEnsuring Host Integrity With Cryptographic Provenance Verification∗
We propose a malware detection approach based on the characteristic behaviors of human users. We explore the humanmalware differences and utilize them to aid the detection of infected hosts. There are two main research challenges in this study: one is how to select characteristic behavior features, and the other is how to prevent malware forgeries. We aim to address both questions in this poster.
متن کاملEnsuring Asset Integrity - A Risk-based Approach
There are many improvement methodologies and techniques available to improve plant reliability and availability, including such techniques as Reliability Centred Maintenance, PM Optimisation, Weibull analysis and others. However all of these techniques have significant limitations when it comes to dealing with high consequence, low probability events – those events that have potentially catastr...
متن کاملEnsuring Media Integrity on Third-Party Infrastructures
In many heterogeneous networked applications the integrity of multimedia data plays an essential role, but is not directly supported by the application. In this paper, we propose a method which enables an individual user to detect tampering with a multimedia file without changing the software application provided by the third party. Our method is based on a combination of cryptographic signatur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Management
سال: 2016
ISSN: 0149-2063,1557-1211
DOI: 10.1177/0149206316643931