Preventation of Data Content Leakage with Secured Encryption Algorithm
نویسندگان
چکیده
منابع مشابه
Chip-Secured Data Access: Reconciling Access Rights with Data Encryption
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Web hosting companies and Database Service Providers strongly emphasize the need for data confidentiality. Users have no other choice than trusting Web companies arguing that their systems are fully secured and th...
متن کاملFunctional Encryption for Secured Big Data Analytics
Big Data has gained a lot of interest now a days due to the enormous scope it introduces for a better understanding of the business and decision making process for an organization. There has been a wide range of researches going on around the globe on this to make the most out of it and quite a number of technical platforms are available to perform various big data analytics. Though, Scientists...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2016
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2016.51267