نتایج جستجو برای: data integrity

تعداد نتایج: 2461987  

Journal: :EPRA international journal of economics, business and management 2023

We attempted to research data integrity and application in the pharmaceutical industry this essay. Data must be used maintain all records sector. The of is a crucial contemporary concern for authorities around world. Numerous issues are discovered by regulating body during inspections as result inadequate practices that subpar products patients. compilation numerous forms information outcomes. ...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

2007
Ben Moss

Data integrity is a fundamental aspect of computer security that has attracted much interest in recent decades. Despite a general consensus for the meaning of the problem, the lack of a formal definition has led to spurious claims such as “tamper proof”, “prevent tampering”, and “tamper protection”, which are all misleading in the absence of a formal definition. Ashman recently proposed a new a...

Journal: :International Journal of Electronic Commerce Studies 2015

Journal: :Wireless Personal Communications 2021

The computation of big data and related services has been the topic research popular applications due to rapid progress technology statistical analysis solutions. There are several issues with quality that contribute error decisions in organizations institutions. Current just covers how adequately validate assure its validity. Data integrity is synonymous It a difficult undertaking often perfor...

2007
Jules R. Nya Huiping Guo

The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile...

2009
Wenjuan Xu Xinwen Zhang Gail-Joon Ahn

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...

Journal: :EURASIP Journal on Information Security 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید