نتایج جستجو برای: data security

تعداد نتایج: 2536913  

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

2004
Claus Vielhauer Ton Kalker

Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both privacy protection and user convenience. From a security point of view, biometric authentication offers the possibility to establish physical presence and unequivocal identification. However from a privacy point of view, t...

2016
Edgar R. Weippl

Landwehr (2001) defines how the etymological roots of the term “secure” are found in “se” which means “without,” or “apart from,” and “cure,” i.e. “to care for,” or “to be concerned about”. While there are many definitions of the primary requirements of security, the classical requirements are summarized by the acronym CIA. CIA is the acronym for confidentiality, integrity, and availability. Al...

1995
Tsau Young Lin Thomas H. Hinke Donald G. Marks Bhavani M. Thuraisingham

Database mining can be defined as the process of mining for implicit, previously unknown, and potentially useful information from very large databases by efficient knowledge discovery techniques. Naturally such a process may open up new inference channels, detect new intrusion patterns, and raises new security problems. New security concern and research problems are addressed and identified. Fi...

Journal: :Scientific journal of Astana IT University 2022

The article describes the IoT infrastructure, hardware of system, considers issue security chosen LoRa data transmission technology. Data was received from sensors for gas, temperature and humidity, atmospheric pressure, as well location end device. At same time, standardized features selected technology transmitting to server were investigated. deals with bi-directional secure communication li...

Journal: :J. Internet Serv. Inf. Secur. 2015
Maxim Kolomeec Andrey Chechulin Igor V. Kotenko

The paper considers common methodological primitives for phased construction of data visualization models, which will help to create new graphical models of data security visualization, or will help to show advantages and disadvantages of existing models. The paper also considers examples of graphical models and additional tools, which allow to work with these models. The purpose of the paper i...

Journal: :International Journal of Engineering Technology and Management Sciences 2020

Journal: :International Journal of Advanced Information Technology 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید