Auswahl der wissenschaftlichen Literatur zum Thema „Information storage and retrieval systems - security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Information storage and retrieval systems - security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Information storage and retrieval systems - security"
Arunarani, Ar, und D. Manjula Perkinian. „Intelligent Techniques for Providing Effective Security to Cloud Databases“. International Journal of Intelligent Information Technologies 14, Nr. 1 (Januar 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Der volle Inhalt der QuelleKovalcik, Justin, und Mike Villalobos. „Automated Storage & Retrieval System“. Information Technology and Libraries 38, Nr. 4 (16.12.2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Der volle Inhalt der QuelleBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade und Suprakash Sudarsanan Nair. „Patient data management using blockchain technology“. Indonesian Journal of Electrical Engineering and Computer Science 32, Nr. 3 (01.12.2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Der volle Inhalt der QuelleShojaei, Parisasadat, Elena Vlahu-Gjorgievska und Yang-Wai Chow. „Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review“. Computers 13, Nr. 2 (31.01.2024): 41. http://dx.doi.org/10.3390/computers13020041.
Der volle Inhalt der QuelleXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao und Xiaojun Zhang. „A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage“. Security and Communication Networks 2018 (06.06.2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Der volle Inhalt der QuellePing, Yuan, Wei Song, Zhili Zhang, Weiping Wang und Baocang Wang. „A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data“. Information 11, Nr. 8 (12.08.2020): 394. http://dx.doi.org/10.3390/info11080394.
Der volle Inhalt der QuelleFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa und Patience Emanre Eshua. „Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review“. European Journal of Electrical Engineering and Computer Science 7, Nr. 6 (13.11.2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Der volle Inhalt der QuelleZhang, Qiuyu, Minrui Fu, Yibo Huang und Zhenyu Zhao. „Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage“. Security and Communication Networks 2022 (30.03.2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Der volle Inhalt der QuelleLi, Weijing, Zicheng Zhou, Wen Fan und Juan Gao. „Design of Data Sharing Platform Based on Blockchain and IPFS Technology“. Wireless Communications and Mobile Computing 2022 (13.07.2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Der volle Inhalt der QuelleTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen und Andrei Costin. „Utilizing Vector Database Management Systems in Cyber Security“. European Conference on Cyber Warfare and Security 23, Nr. 1 (21.06.2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Der volle Inhalt der QuelleDissertationen zum Thema "Information storage and retrieval systems - security"
Cheung, Yee-him, und 張貽謙. „Secure object spaces for global information retrieval (SOSGIR)“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Der volle Inhalt der QuelleLabert, Matthew J. „Implementation of information assurance risk management training into existing Department of the Navy training pipelines /“. Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5991.
Der volle Inhalt der QuelleWith the implementation and continuing research on information systems, such as Information Technology for the 21st Century (IT-21), Navy-Marine Corps Intranet (NMCI), and "Network-Centric warfare," there is little doubt that the Navy is becoming heavily dependent on information and information systems. Though much has been accomplished technically to protect and defend these systems, an important security issue has thus far been overlooked-the human factor. Information Assurance Risk Management (IARM) was a proposal to standardize the way DON personnel discuss, treat, and implement information assurance. IARM addresses the human security aspect of information and information systems in a regimented way to be understandable through all levels of the DON. To standardize the way DON personnel perceive information assurance, they must be taught what IARM is and how to use it. Can an IARM course be implemented in the DON, and if so at what level and to whom should it be taught?
Stieger, Ewald Andreas. „A framework for the development of a personal information security agent“. Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012326.
Der volle Inhalt der QuelleSubbiah, Arun. „Efficient Proactive Security for Sensitive Data Storage“. Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Der volle Inhalt der QuelleHorn, John F. „IPSec-based dynamic security services for the MYSEA environment“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
Radley, Johannes Jurgens. „Pseudo-random access compressed archive for security log data“. Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.
Der volle Inhalt der QuelleParameswaran, Rupa. „A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering“. Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11459.
Der volle Inhalt der QuelleNtsham, Xolile. „Information flows in the social development grant process: a user experience perspective“. Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.
Der volle Inhalt der QuelleThis study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an increasingly important role in reducing poverty and inequality in South Africa, but are also subject to challenges like dependency, mismanagement and corruption. Information flow within SASSA is essential for the coordination of the grant process. The success of administering any social grant process depends largely on efficient communication practices and stable information technology. Communication among grant users requires the transfer of relevant information from its point of inception to the next point(s) of use. Government departments are transposing their paper-based systems into digital systems, which pose new implications for grant administration, however. Accordingly, the use of electronic services in government should mean faster information flow and, thus, more effective service delivery. The literature reveals, however, that non-technical aspects like user experience (UX) are essential in designing meaningful e-government systems. With a focus on user experience, this study uncovers the problems that SASSA and grant users face in the grant process and works toward possible solutions to resolve these problems. This research lays an important foundation in terms of gaining a better understanding of information flows, e-government, and user experiences in the grant process. This research is exploratory in nature and adopts a qualitative interpretivist approach. To gain a deeper understanding of the perspectives and experiences of grant users, the researcher employed the „Institutionalise User Experience in Government‟ (IUXG) methodology. The study targeted individuals that had knowledge of the social grants. A purposive sampling technique was used to select the research participants. Furthermore, the researcher adopted a thematic analysis method to code and analyse data. The findings of this study revealed the centrality of user experience in the grant process, notably in terms of the many challenges associated with information flow. The findings also revealed that factors such as social grant awareness, availability and use of information technology, digital divide, and grant accessibility bring enormous impact on grant processes and service delivery. The study contributes a landscape model for depicting the information flows in processing grants, and develops a broader understanding of how technology can help users to better disburse, access, and utilise grants. The study also informs e- government practitioners about the design and implementation of user-centred design with emphasis on information flows. Key Words: Information flows, social grants, e-government, and user experience.
Mashima, Daisuke. „Safeguarding health data with enhanced accountability and patient awareness“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45775.
Der volle Inhalt der QuelleWatkins, Alfred R. „Continuous media object modeling, storage, and retrieval“. Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/9184.
Der volle Inhalt der QuelleBücher zum Thema "Information storage and retrieval systems - security"
Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.
Den vollen Inhalt der Quelle finden), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Den vollen Inhalt der Quelle findenComputer Systems Laboratory (U.S.), Hrsg. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Den vollen Inhalt der Quelle findenUnited States. National Aeronautics and Space Administration., Hrsg. NASA electronic library system (NELS): The system impact of security. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1993.
Den vollen Inhalt der Quelle findenGoldston, James K. A guide to understanding data remanence in automated information systems. 2. Aufl. [Fort George G. Meade, MD]: National Computer Security Center, 1991.
Den vollen Inhalt der Quelle findenNational Institute of Standards and Technology (U.S.). Security requirements for cryptographic modules. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Den vollen Inhalt der Quelle findenUnited States. General Accounting Office. Information Management & Technology Division., Hrsg. SSA pilot for centralized folder storage. Washington, D.C: The Office, 1992.
Den vollen Inhalt der Quelle findenUnited States. Department of Transportation. Office of Inspector General. Information security program. Washington, D.C: U.S Dept. of Transportation, Office of the Secretary of Transportation, Office of Inspector General, 2005.
Den vollen Inhalt der Quelle findenVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Den vollen Inhalt der Quelle findenWitt-Barthel, Annegret. Chancen sozialorientierter Technikgestaltung: Politische Ansätze und Gestaltbarkeit der Informationstechnik in der sozialen Sicherung. Opladen: Westdeutscher Verlag, 1992.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Information storage and retrieval systems - security"
Dave, Jay, Shweta Saharan, Parvez Faruki, Vijay Laxmi und Manoj Singh Gaur. „Secure Random Encryption for Deduplicated Storage“. In Information Systems Security, 164–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_10.
Der volle Inhalt der QuelleNayak, Sanjeet Kumar, und Somanath Tripathy. „SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage“. In Information Systems Security, 50–67. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_4.
Der volle Inhalt der QuelleBasu, Atanu, Indranil Sengupta und Jamuna Kanta Sing. „Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy“. In Information Systems Security, 175–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_12.
Der volle Inhalt der QuelleGodard, Jérôme, Frédéric Andres und Kinji Ono. „Advanced Storage and Retrieval of XML Multimedia Documents“. In Databases in Networked Information Systems, 64–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36233-9_6.
Der volle Inhalt der QuelleZhu, Lin, Changlu Lin, Fuchun Lin und Liang Feng Zhang. „Post-Quantum Cheating Detectable Private Information Retrieval“. In ICT Systems Security and Privacy Protection, 431–48. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_25.
Der volle Inhalt der QuelleVerma, Rajat, Namrata Dhanda und Vishal Nagar. „Security Concerns in IoT Systems and Its Blockchain Solutions“. In Cyber Intelligence and Information Retrieval, 485–95. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4284-5_42.
Der volle Inhalt der QuelleAugot, Daniel, Françoise Levy-dit-Vehel und Abdullatif Shikfa. „A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers“. In Cryptology and Network Security, 222–39. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_15.
Der volle Inhalt der QuelleAbhijith, V. S., B. Sowmiya, S. Sudersan, M. Thangavel und P. Varalakshmi. „A Review on Security Issues in Healthcare Cyber-Physical Systems“. In Cyber Intelligence and Information Retrieval, 37–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4284-5_4.
Der volle Inhalt der QuelleParra, Jhordany Rodriguez, Terence Chan und Siu-Wai Ho. „A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems“. In Information Security and Privacy, 505–13. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40367-0_34.
Der volle Inhalt der QuelleGao, Xiaofei, Tiezheng Nie, Derong Shen, Yue Kou, Guangyu He und Shicheng Xu. „B-store, a General Block Storage and Retrieval System for Blockchain“. In Web Information Systems and Applications, 674–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20309-1_59.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Information storage and retrieval systems - security"
Talib, Amir Mohamed, Rodziah Atan, Rusli Abdullah und Masrah Azrifah Azmi Murad. „Security framework of cloud data storage based on Multi Agent system architecture - A pilot study“. In 2012 International Conference on Information Retrieval & Knowledge Management (CAMP). IEEE, 2012. http://dx.doi.org/10.1109/infrkm.2012.6205035.
Der volle Inhalt der QuelleRuamjinda, Poramaporn, und Nakornthip Prompoon. „Framwork for information security standards storage and retrieval using security patterns“. In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615309.
Der volle Inhalt der QuelleShibu, Abhinav, Anirudh M, Anisha T. Anilkumar, Ashwin Radhakrishnan und Sminu Izudheen. „Secure Storage and Retrieval of Electronic Health Records“. In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 2022. http://dx.doi.org/10.1109/ic3sis54991.2022.9885484.
Der volle Inhalt der QuelleHuang, RuWei, XiaoLin Gui, Si Yu und Wei Zhuang. „Research on Privacy-Preserving Cloud Storage Framework Supporting Ciphertext Retrieval“. In 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.27.
Der volle Inhalt der QuelleZhu, Wei-Heng, und Shun Long. „A Network File Storage Model with Security and Information Retrieval Support“. In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.30.
Der volle Inhalt der QuelleRuoqing Zhang, Zehui Li, Zichen Li und Yatao Yang. „An Efficient Massive Evidence Storage and Retrieval Scheme in Encrypted Database“. In 2013 International Conference on Information and Network Security (ICINS 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2469.
Der volle Inhalt der QuelleBala, Sai Sleghana, Bhavya Prasad, Anjali Maruti Jadhav und Kumud Wasnik. „Online Storage, Retrieval & Authentication of Healthcare Documents using Ethereum Blockchain“. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2022. http://dx.doi.org/10.1109/icbds53701.2022.9935915.
Der volle Inhalt der Quelle„Hovering Information: A Self-Organising Infrastructure-Free Information Storage and Retrieval Service“. In 4th International Workshop on Enterprise Systems and Technology. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0004465500690087.
Der volle Inhalt der QuelleTakayuki Tsuchida, Tatsuo Tsuj und Ken Higuchi. „Considerations on information storage and retrieval systems for recycling objects“. In 2007 IEEE International Conference on Systems, Man and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icsmc.2007.4413856.
Der volle Inhalt der QuelleClarke, Charles L. A., Philip L. Tilker, Allen Quoc-Luan Tran, Kevin Harris und Antonio S. Cheng. „A reliable storage management layer for distributed information retrieval systems“. In the twelfth international conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/956863.956905.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Information storage and retrieval systems - security"
HOLDEN, N. E. A SHORT HISTORY CSISRS - AT THE CUTTING EDGE OF NUCLEAR DATA INFORMATION STORAGE AND RETRIEVAL SYSTEMS AND ITS RELATIONSHIP TO CINDA, EXFOR AND ENDF. Office of Scientific and Technical Information (OSTI), Dezember 2005. http://dx.doi.org/10.2172/862430.
Der volle Inhalt der QuelleFriedman, Haya, Julia Vrebalov und James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, Oktober 2014. http://dx.doi.org/10.32747/2014.7594401.bard.
Der volle Inhalt der QuelleSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev und Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], Juni 2019. http://dx.doi.org/10.31812/123456789/3178.
Der volle Inhalt der QuelleMaletta, Giovanna, und Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/ulfp1679.
Der volle Inhalt der QuelleData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Der volle Inhalt der Quelle