نتایج جستجو برای: data integrity

تعداد نتایج: 2461987  

2013
P. Parvathi T. Meyyappan

Cloud computing is a internet based computing model that supports convenient ,on-demand and pay-for-use model. In this computing, data owners host their data on cloud servers and clients can access the data from cloud servers. Due to the data outsourcing, efficient verification of the outsourced data becomes a formidable challenge for data security in Cloud Computing (CC). Therefore, an indepen...

2005
Sarfraz Khurshid Iván García Yuk Lai Suen

We present a novel algorithm for repairing structurally complex data. Given an assertion that represents desired structural integrity constraints and a structure that violates them, the algorithm performs repair actions that mutate the given structure to generate a new structure that satisfies the constraints. Assertions are written as imperative predicates, which can express rich structural pr...

2011
Lukasz Golab Flip Korn Divesh Srivastava

In this paper, we present a case study that illustrates the utility of pattern tableau discovery for data quality analysis. Given a usersupplied integrity constraint, such as a boolean predicate expected to be satisfied by every tuple, a functional dependency, or an inclusion dependency, a pattern tableau is a concise summary of subsets of the data that satisfy or fail the constraint. We descri...

2006
Antonia Ghiselli Federico Stagni Riccardo Zappi

In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment. Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO users. We split the process for data access in three levels: Grid authentication, Grid authorization, local enforcement. For each level, we introduce...

2011
BHAVNA ARORA MAKIN

Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There have been many related work proposed to address these security issues. In this paper, we introduce the concept of mobile agents for secure data aggregation in sensor ...

Journal: :Information Security Journal: A Global Perspective 2009
Amine Boukhtouta Dima Alhadidi Mourad Debbabi

The main contribution of this paper is to present an extension to AspectJ compiler ajc-1.5.0 for security hardening. The extension consists of two pointcuts that can capture the returned computable values of methods in both the execution scope or following a method invocation. The returned values in programs are the results of operations done in the execution scope of methods. They are signific...

Journal: :JNW 2013
Pinghui Zou

Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...

2017
Dag Hovland Roman Kontchakov Martin G. Skjæveland Arild Waaler Michael Zakharyaschev

We report on our experience in ontology-based data access to the Slegge database at Statoil and share the resources employed in this use case: enduser information needs (in natural language), their translations into SPARQL, the Subsurface Exploration Ontology, the schema of the Slegge database with integrity constraints, and the mappings connecting the ontology and the schema.

2011
Yusuf Yiliyasi Daniel Berleant

While high quality oil data can help oil companies and governments reduce risk of investments and increase profits, bad oil data can lead to economic losses. In this research, we propose a framework for assessing the information quality of world oil reserves data. The framework is applied by calculating the information quality ratings of relevant information sources. The information quality dim...

Journal: :Security and Communication Networks 2022

Recently, data integrity for multiagent-based big environments has been challenging. This paper presents a blockchain-based Merkle DAG structure (M-DAG) audit integrity. M-DAG resolves the problem that arises due to multicopy of large volume in environment. It employed Boneh–Lynn–Shacham’s (BSL) signature verify identical on environments. The proposed mechanism uses consortium chain algorithm d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید