Academic literature on the topic 'Information storage and retrieval systems - security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information storage and retrieval systems - security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information storage and retrieval systems - security"

1

Arunarani, Ar, and D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases." International Journal of Intelligent Information Technologies 14, no. 1 (January 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.

Full text
Abstract:
Cloud databases have been used in a spate of web-based applications in recent years owing to their capacity to store big data efficiently. In such a scenario, access control techniques implemented in relational databases are so modified as to suit cloud databases. The querying features of cloud databases are designed with facilities to retrieve encrypted data. The performance with respect to retrieval and security needs further improvements to ensure a secured retrieval process. In order to provide an efficient secured retrieval mechanism, a rule- and agent-based intelligent secured retrieval model has been proposed in this paper that analyzes the user, query and contents to be retrieved so as to effect rapid retrieval with decryption from the cloud databases. The major advantage of this retrieval model is in terms of its improved query response time and enhanced security of the storage and retrieval system. From the experiments conducted in this work, proposed model increased storage and access time and, in addition, intensified the security of the data stored in cloud databases.
APA, Harvard, Vancouver, ISO, and other styles
2

Kovalcik, Justin, and Mike Villalobos. "Automated Storage & Retrieval System." Information Technology and Libraries 38, no. 4 (December 16, 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.

Full text
Abstract:
The California State University, Northridge (CSUN) Oviatt Library was the first library in the world to integrate an automated storage and retrieval system (AS/RS) into its operations. The AS/RS continues to provide efficient space management for the library. However, added value has been identified in materials security and inventory as well as customer service. The concept of library as space, paired with improved services and efficiencies, has resulted in the AS/RS becoming a critical component of library operations and future strategy. Staffing, service, and security opportunities paired with support and maintenance challenges, enable the library to provide a unique critique and assessment of an AS/RS.
APA, Harvard, Vancouver, ISO, and other styles
3

Bidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade, and Suprakash Sudarsanan Nair. "Patient data management using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (December 1, 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.

Full text
Abstract:
<span>The patient data management is an essential component of healthcare systems, the secure and efficient data processing is important for the medical data. Data security, interoperability and privacy are the key requirements of data storage systems of healthcare organizations. The electronic medical records have become a key technique to maintain patient information in hospitals due to the technology revolution. Some hospital systems are also using server-based patient detail management systems, they require considerable storage to record all of the patient's medical reports, limiting scalability. They are facing difficulties, including interoperability, security and privacy worries, cyberattacks on centralized storage, and maintaining medical policy compliance simultaneously. The blockchain technology has come up with solution having decentralized and irreversible data storage. A distributed secure ledger of blockchain is the solution, enabling safe storage and retrieval of data. The proposed work yields effectively deployed smart contracts based on the system's functions, real-time patient health monitoring. The main goal of this system is to bring the whole medical data together on a single platform, employing a secured decentralized approach to store and retrieve medical information effectively.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Shojaei, Parisasadat, Elena Vlahu-Gjorgievska, and Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review." Computers 13, no. 2 (January 31, 2024): 41. http://dx.doi.org/10.3390/computers13020041.

Full text
Abstract:
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet patient needs, as well as to ensure the security and privacy of medical data, including confidentiality, integrity, and availability, which are necessary to achieve high-quality healthcare services. This systematic literature review identifies various technologies and methods currently employed to enhance the security and privacy of medical data within HISs. Various technologies have been utilized to enhance the security and privacy of healthcare information, such as the IoT, blockchain, mobile health applications, cloud computing, and combined technologies. This study also identifies three key security aspects, namely, secure access control, data sharing, and data storage, and discusses the challenges faced in each aspect that must be enhanced to ensure the security and privacy of patient information in HISs.
APA, Harvard, Vancouver, ISO, and other styles
5

Xie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao, and Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage." Security and Communication Networks 2018 (June 6, 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.

Full text
Abstract:
With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
6

Ping, Yuan, Wei Song, Zhili Zhang, Weiping Wang, and Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data." Information 11, no. 8 (August 12, 2020): 394. http://dx.doi.org/10.3390/info11080394.

Full text
Abstract:
With the rapid development of cloud computing, massive data are transferred to cloud servers for storage and management savings. For privacy concerns, data should be encrypted before being uploaded. In the encrypted-domain (ED), however, many data computing methods working in the plain-domain are no longer applicable. Data retrieval has become a significant obstacle to cloud storage services. To break through this limitation, we propose a multi-keyword searchable encryption scheme by introducing probability trapdoors. Firstly, a keywords probability trapdoor is established to ensure that the scheme can resist indistinguishable attacks. Based on the keywords trapdoor, we present the keywords vector to make the scheme realize multi-keyword search in the process of data retrieval in the ED. Both security and performance analysis confirm the advantages of the proposed scheme in terms of search functionality and complexity.
APA, Harvard, Vancouver, ISO, and other styles
7

Folasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa, and Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review." European Journal of Electrical Engineering and Computer Science 7, no. 6 (November 13, 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.

Full text
Abstract:
Electronic Health Record (EHR) systems have revolutionized the healthcare industry by enabling the efficient storage, retrieval, and sharing of patient health information. However, the widespread adoption of EHR systems has also engendered a myriad of privacy and security challenges that must be spoke to guarantee the privacy, integrity, and accessibility of sensitive patient evidence. A range of countermeasures has been implemented to reduce the risks associated with EHR data privacy and security. These include contact switch tools that limit data access to approved operators, as well as advanced encryption methods like Identity-Based Encryption and Attribute-Based Encryption, specifically tailored for securing EHR data in cloud environments. By employing these protective measures, healthcare providers can enhance the safety of sensitive patient information while adapting to the dynamic digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Qiuyu, Minrui Fu, Yibo Huang, and Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage." Security and Communication Networks 2022 (March 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.

Full text
Abstract:
In order to solve the problem of multiuser security sharing and privacy protection of the speech data in cloud storage and realize efficient encrypted speech retrieval, an encrypted speech retrieval scheme based on multiuser searchable encryption was proposed. Firstly, the ciphertext-policy attribute-based encryption (CP-ABE) and searchable encryption (SE) are combined to support a multiuser searchable speech encryption scheme, which achieves the encryption and fine-grained access control of the speech data. Secondly, the Mel frequency cepstral coefficient (MFCC) feature of the original speech that is used as the input of the long- and short-term memory network (LSTM) is extracted to perform the deep semantic feature extraction as the speech keywords. Finally, the speech keywords are encrypted to generate a secure index, bound together with the encrypted speech, and then stored in the cloud. During the user retrieving, the keywords of query speech are extracted by utilizing the trained LSTM to generate the search trapdoor of the user and then uploaded to the cloud server, and the Euclidean distance is used for matching the security index with the search trapdoor. In addition, a proxy server is introduced to execute the partial ciphertext decryption operations to reduce computation overhead and storage space. The theoretical analysis and experimental results show that the proposed scheme has higher security and retrieval accuracy and can realize the secure storage of the massive speech data and multiuser data sharing.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Weijing, Zicheng Zhou, Wen Fan, and Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology." Wireless Communications and Mobile Computing 2022 (July 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.

Full text
Abstract:
With the continuous development of the information age, data sharing and exchange are gradually increasing. The Internet and big data technology provide a guarantee for data sharing and transmission. At present, as the amount of data increases rapidly, how to realize data sharing has become a huge challenge. To solve this problem, this paper proposes a data sharing platform based on the combination of blockchain and interplanetary file system (IPFS) technology to solve the data sharing and storage. Firstly, by constructing the alliance blockchain, the consensus mechanism of computing power competition is used to maintain the data written into the blockchain, and the IPFS data storage system is established to store data using distributed storage, file splitting, and splicing technologies. Secondly, a data sharing platform composed of blockchain module, IPFS module, encryption and decryption module, and fast retrieval module is built. Data encryption is processed by encryption and decryption module, and the processed data is uploaded to THE IPFS module; the abstract and other information are finally written into the blockchain through the blockchain module. The fast retrieval module can quickly locate the required data according to the retrieval conditions in the mass blockchain data; finally, the security and storage of data sharing platform are guaranteed through security and performance evaluation. The research results solve the problem of large amount of data sharing, realize the data decentralization, and ensure the data storage security.
APA, Harvard, Vancouver, ISO, and other styles
10

Taipalus, Toni, Hilkka Grahn, Hannu Turtiainen, and Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.

Full text
Abstract:
The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and writing hundreds of operations per second. Vector DBMSs (VDBMS) are novel products that focus on the management of vector data and can alleviate data management pressures by storing data objects such as logs, system calls, emails, network flow data, and memory dumps in feature vectors that are computationally efficient in both storage and information retrieval. VDMBSs allow efficient nearest neighbour similarity search on complex data objects, which can be used in various cyber security applications such as anomaly, intrusion, malware detection, user behaviour analysis, and network flow analysis. This study describes VDBMSs and some of their use cases in cyber security.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information storage and retrieval systems - security"

1

Cheung, Yee-him, and 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Labert, Matthew J. "Implementation of information assurance risk management training into existing Department of the Navy training pipelines /." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5991.

Full text
Abstract:
Approved for public release, distribution is unlimited
With the implementation and continuing research on information systems, such as Information Technology for the 21st Century (IT-21), Navy-Marine Corps Intranet (NMCI), and "Network-Centric warfare," there is little doubt that the Navy is becoming heavily dependent on information and information systems. Though much has been accomplished technically to protect and defend these systems, an important security issue has thus far been overlooked-the human factor. Information Assurance Risk Management (IARM) was a proposal to standardize the way DON personnel discuss, treat, and implement information assurance. IARM addresses the human security aspect of information and information systems in a regimented way to be understandable through all levels of the DON. To standardize the way DON personnel perceive information assurance, they must be taught what IARM is and how to use it. Can an IARM course be implemented in the DON, and if so at what level and to whom should it be taught?
APA, Harvard, Vancouver, ISO, and other styles
3

Stieger, Ewald Andreas. "A framework for the development of a personal information security agent." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012326.

Full text
Abstract:
Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
APA, Harvard, Vancouver, ISO, and other styles
4

Subbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Full text
Abstract:
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and confidentiality properties of the data storage service. This dissertation investigates the design of a proactively-secure distributed data storage system. Data can be stored at storage servers using encoding schemes called secret sharing, or encryption-with-replication. The primary challenge is that the protocols that the servers run periodically to maintain integrity and confidentiality must scale with large amounts of stored data. Determining how much data can be proactively-secured in practical settings is an important objective of this dissertation. The protocol for maintain the confidentiality of stored data is developed in the context of data storage using secret sharing. We propose a new technique called the GridSharing framework that uses a combination of XOR secret sharing and replication for storing data efficiently. We experimentally show that the algorithm can secure several hundred GBs of data. We give distributed protocols run periodically by the servers for maintaining the integrity of replicated data under the mobile adversary model. This protocol is integrated into a document repository to make it proactively-secure. The proactively-secure document repository is implemented and evaluated on the Emulab cluster (http://www.emulab.net). The experimental evaluation shows that several 100 GBs of data can be proactively-secured. This dissertation also includes work on fault and intrusion detection - a necessary component in any secure system. We give a novel Byzantine-fault detection algorithm for quorum systems, and experimentally evaluate its performance using simulations and by deploying it in the AgileFS distributed file system.
APA, Harvard, Vancouver, ISO, and other styles
5

Horn, John F. "IPSec-based dynamic security services for the MYSEA environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Radley, Johannes Jurgens. "Pseudo-random access compressed archive for security log data." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.

Full text
Abstract:
We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates the compression performance penalties encountered by using this storage system, including decreased compression ratio, as well as increased compression and decompression times.
APA, Harvard, Vancouver, ISO, and other styles
7

Parameswaran, Rupa. "A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11459.

Full text
Abstract:
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases, such as government records, medical records, and voters and #146; lists, pose a threat to personal privacy. The concern over individual privacy has led to the development of legal codes for safeguarding privacy in several countries. However, the ignorance of individuals as well as loopholes in the systems, have led to information breaches even in the presence of such rules and regulations. Protection against data privacy requires modification of the data itself. The term {em data obfuscation} is used to refer to the class of algorithms that modify the values of the data items without distorting the usefulness of the data. The main goal of this thesis is the development of a data obfuscation technique that provides robust privacy protection with minimal loss in usability of the data. Although medical and financial services are two of the major areas where information privacy is a concern, privacy breaches are not restricted to these domains. One of the areas where the concern over data privacy is of growing interest is collaborative filtering. Collaborative filtering systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. The prediction accuracy of these systems is dependent on the size and accuracy of the data provided by users. However, the lack of sufficient guidelines governing the use and distribution of user data raises concerns over individual privacy. Users often provide the minimal information that is required for accessing these E-commerce services. The lack of rules governing the use and distribution of data disallows sharing of data among different communities for collaborative filtering. The goals of this thesis are (a) the definition of a standard for classifying DO techniques, (b) the development of a robust cluster preserving data obfuscation algorithm, and (c) the design and implementation of a privacy-preserving shared collaborative filtering framework using the data obfuscation algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

Ntsham, Xolile. "Information flows in the social development grant process: a user experience perspective." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Information Technology in the Faculty of Informatics and design at the Cape Peninsula University of Technology 2014
This study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an increasingly important role in reducing poverty and inequality in South Africa, but are also subject to challenges like dependency, mismanagement and corruption. Information flow within SASSA is essential for the coordination of the grant process. The success of administering any social grant process depends largely on efficient communication practices and stable information technology. Communication among grant users requires the transfer of relevant information from its point of inception to the next point(s) of use. Government departments are transposing their paper-based systems into digital systems, which pose new implications for grant administration, however. Accordingly, the use of electronic services in government should mean faster information flow and, thus, more effective service delivery. The literature reveals, however, that non-technical aspects like user experience (UX) are essential in designing meaningful e-government systems. With a focus on user experience, this study uncovers the problems that SASSA and grant users face in the grant process and works toward possible solutions to resolve these problems. This research lays an important foundation in terms of gaining a better understanding of information flows, e-government, and user experiences in the grant process. This research is exploratory in nature and adopts a qualitative interpretivist approach. To gain a deeper understanding of the perspectives and experiences of grant users, the researcher employed the „Institutionalise User Experience in Government‟ (IUXG) methodology. The study targeted individuals that had knowledge of the social grants. A purposive sampling technique was used to select the research participants. Furthermore, the researcher adopted a thematic analysis method to code and analyse data. The findings of this study revealed the centrality of user experience in the grant process, notably in terms of the many challenges associated with information flow. The findings also revealed that factors such as social grant awareness, availability and use of information technology, digital divide, and grant accessibility bring enormous impact on grant processes and service delivery. The study contributes a landscape model for depicting the information flows in processing grants, and develops a broader understanding of how technology can help users to better disburse, access, and utilise grants. The study also informs e- government practitioners about the design and implementation of user-centred design with emphasis on information flows. Key Words: Information flows, social grants, e-government, and user experience.
APA, Harvard, Vancouver, ISO, and other styles
9

Mashima, Daisuke. "Safeguarding health data with enhanced accountability and patient awareness." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45775.

Full text
Abstract:
Several factors are driving the transition from paper-based health records to electronic health record systems. In the United States, the adoption rate of electronic health record systems significantly increased after "Meaningful Use" incentive program was started in 2009. While increased use of electronic health record systems could improve the efficiency and quality of healthcare services, it can also lead to a number of security and privacy issues, such as identity theft and healthcare fraud. Such incidents could have negative impact on trustworthiness of electronic health record technology itself and thereby could limit its benefits. In this dissertation, we tackle three challenges that we believe are important to improve the security and privacy in electronic health record systems. Our approach is based on an analysis of real-world incidents, namely theft and misuse of patient identity, unauthorized usage and update of electronic health records, and threats from insiders in healthcare organizations. Our contributions include design and development of a user-centric monitoring agent system that works on behalf of a patient (i.e., an end user) and securely monitors usage of the patient's identity credentials as well as access to her electronic health records. Such a monitoring agent can enhance patient's awareness and control and improve accountability for health records even in a distributed, multi-domain environment, which is typical in an e-healthcare setting. This will reduce the risk and loss caused by misuse of stolen data. In addition to the solution from a patient's perspective, we also propose a secure system architecture that can be used in healthcare organizations to enable robust auditing and management over client devices. This helps us further enhance patients' confidence in secure use of their health data.
APA, Harvard, Vancouver, ISO, and other styles
10

Watkins, Alfred R. "Continuous media object modeling, storage, and retrieval." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/9184.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information storage and retrieval systems - security"

1

Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. National Aeronautics and Space Administration., ed. NASA electronic library system (NELS): The system impact of security. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goldston, James K. A guide to understanding data remanence in automated information systems. 2nd ed. [Fort George G. Meade, MD]: National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.). Security requirements for cryptographic modules. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. General Accounting Office. Information Management & Technology Division., ed. SSA pilot for centralized folder storage. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Department of Transportation. Office of Inspector General. Information security program. Washington, D.C: U.S Dept. of Transportation, Office of the Secretary of Transportation, Office of Inspector General, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Witt-Barthel, Annegret. Chancen sozialorientierter Technikgestaltung: Politische Ansätze und Gestaltbarkeit der Informationstechnik in der sozialen Sicherung. Opladen: Westdeutscher Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information storage and retrieval systems - security"

1

Dave, Jay, Shweta Saharan, Parvez Faruki, Vijay Laxmi, and Manoj Singh Gaur. "Secure Random Encryption for Deduplicated Storage." In Information Systems Security, 164–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nayak, Sanjeet Kumar, and Somanath Tripathy. "SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage." In Information Systems Security, 50–67. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basu, Atanu, Indranil Sengupta, and Jamuna Kanta Sing. "Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy." In Information Systems Security, 175–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Godard, Jérôme, Frédéric Andres, and Kinji Ono. "Advanced Storage and Retrieval of XML Multimedia Documents." In Databases in Networked Information Systems, 64–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36233-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Lin, Changlu Lin, Fuchun Lin, and Liang Feng Zhang. "Post-Quantum Cheating Detectable Private Information Retrieval." In ICT Systems Security and Privacy Protection, 431–48. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Verma, Rajat, Namrata Dhanda, and Vishal Nagar. "Security Concerns in IoT Systems and Its Blockchain Solutions." In Cyber Intelligence and Information Retrieval, 485–95. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4284-5_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Augot, Daniel, Françoise Levy-dit-Vehel, and Abdullatif Shikfa. "A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers." In Cryptology and Network Security, 222–39. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abhijith, V. S., B. Sowmiya, S. Sudersan, M. Thangavel, and P. Varalakshmi. "A Review on Security Issues in Healthcare Cyber-Physical Systems." In Cyber Intelligence and Information Retrieval, 37–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4284-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Parra, Jhordany Rodriguez, Terence Chan, and Siu-Wai Ho. "A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems." In Information Security and Privacy, 505–13. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40367-0_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gao, Xiaofei, Tiezheng Nie, Derong Shen, Yue Kou, Guangyu He, and Shicheng Xu. "B-store, a General Block Storage and Retrieval System for Blockchain." In Web Information Systems and Applications, 674–86. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20309-1_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information storage and retrieval systems - security"

1

Talib, Amir Mohamed, Rodziah Atan, Rusli Abdullah, and Masrah Azrifah Azmi Murad. "Security framework of cloud data storage based on Multi Agent system architecture - A pilot study." In 2012 International Conference on Information Retrieval & Knowledge Management (CAMP). IEEE, 2012. http://dx.doi.org/10.1109/infrkm.2012.6205035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ruamjinda, Poramaporn, and Nakornthip Prompoon. "Framwork for information security standards storage and retrieval using security patterns." In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shibu, Abhinav, Anirudh M, Anisha T. Anilkumar, Ashwin Radhakrishnan, and Sminu Izudheen. "Secure Storage and Retrieval of Electronic Health Records." In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 2022. http://dx.doi.org/10.1109/ic3sis54991.2022.9885484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, RuWei, XiaoLin Gui, Si Yu, and Wei Zhuang. "Research on Privacy-Preserving Cloud Storage Framework Supporting Ciphertext Retrieval." In 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Wei-Heng, and Shun Long. "A Network File Storage Model with Security and Information Retrieval Support." In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ruoqing Zhang, Zehui Li, Zichen Li, and Yatao Yang. "An Efficient Massive Evidence Storage and Retrieval Scheme in Encrypted Database." In 2013 International Conference on Information and Network Security (ICINS 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bala, Sai Sleghana, Bhavya Prasad, Anjali Maruti Jadhav, and Kumud Wasnik. "Online Storage, Retrieval & Authentication of Healthcare Documents using Ethereum Blockchain." In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2022. http://dx.doi.org/10.1109/icbds53701.2022.9935915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Hovering Information: A Self-Organising Infrastructure-Free Information Storage and Retrieval Service." In 4th International Workshop on Enterprise Systems and Technology. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0004465500690087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Takayuki Tsuchida, Tatsuo Tsuj, and Ken Higuchi. "Considerations on information storage and retrieval systems for recycling objects." In 2007 IEEE International Conference on Systems, Man and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icsmc.2007.4413856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clarke, Charles L. A., Philip L. Tilker, Allen Quoc-Luan Tran, Kevin Harris, and Antonio S. Cheng. "A reliable storage management layer for distributed information retrieval systems." In the twelfth international conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/956863.956905.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information storage and retrieval systems - security"

1

HOLDEN, N. E. A SHORT HISTORY CSISRS - AT THE CUTTING EDGE OF NUCLEAR DATA INFORMATION STORAGE AND RETRIEVAL SYSTEMS AND ITS RELATIONSHIP TO CINDA, EXFOR AND ENDF. Office of Scientific and Technical Information (OSTI), December 2005. http://dx.doi.org/10.2172/862430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Friedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, October 2014. http://dx.doi.org/10.32747/2014.7594401.bard.

Full text
Abstract:
Background : Banana being a monocot and having distinct peel and pulp tissues is unique among the fleshy fruits and hence can provide a more comprehensive understanding of fruit ripening. Our previous research which translated ripening discoveries from tomato, led to the identification of six banana fruit-associated MADS-box genes, and we confirmed the positive role of MaMADS1/2 in banana ripening. The overall goal was to further elucidate the banana ripening signaling pathway as mediated by MADS-boxtranscriptional regulators. Specific objectives were: 1) characterize transcriptional profiles and quality of MaMADS1/2 repressed fruit; 2) reveal the role of additional MaMADSgenes in ripening; 3) develop a model of fruit MaMADS-box mode of action; and 4) isolate new components of the banana ripening signaling pathway. Major conclusion: The functions of the banana MaMADS1-5 have been examined by complimenting the rinor the TAGL1-suppressed lines of tomato. Only MaMADS5 exhibited partial complementation of TAGL1-suppressed and rinlines, suggesting that while similar genes play corresponding roles in ripening, evolutionary divergence makes heterologous complementation studies challenging. Nevertheless, the partial complementation of tomato TAGL1-surpessed and rinlines with MaMADS5 suggests this gene is likely an important ripening regulator in banana, worthy of further study. RNA-seqtranscriptome analysis during ripening was performed on WT and MaMADS2-suppressed lines revealing additional candidate genes contributing to ripening control mechanisms. In summary, we discovered 39 MaMADS-box genes in addition to homologues of CNR, NOR and HB-1 expressed in banana fruits, and which were shown in tomato to play necessary roles in ripening. For most of these genes the expression in peel and pulp was similar. However, a number of key genes were differentially expressed between these tissues indicating that the regulatory components which are active in peel and pulp include both common and tissue-specific regulatory systems, a distinction as compared to the more uniform tomato fruit pericarp. Because plant hormones are well documented to affect fruit ripening, the expressions of genes within the auxin, gibberellin, abscisic acid, jasmonic acid, salicylic and ethylene signal transduction and synthesis pathways were targeted in our transcriptome analysis. Genes’ expression associated with these pathways generally declined during normal ripening in both peel and pulp, excluding cytokinin and ethylene, and this decline was delayed in MaMADS2-suppressed banana lines. Hence, we suggest that normal MaMADS2 activity promotes the observed downward expression within these non-ethylene pathways (especially in the pulp), thus enabling ripening progression. In contrast, the expressions of ACSand ACOof the ethylene biosynthesis pathway increase in peel and pulp during ripening and are delayed/inhibited in the transgenic bananas, explaining the reduced ethylene production of MaMADS2-suppressed lines. Inferred by the different genes’ expression in peel and pulp of the gibberellins, salicylic acid and cytokinins pathways, it is suggested that hormonal regulation in these tissues is diverse. These results provide important insights into possible avenues of ripening control in the diverse fruit tissues of banana which was not previously revealed in other ripening systems. As such, our transcriptome analysis of WT and ripening delayed banana mutants provides a starting point for further characterization of ripening. In this study we also developed novel evidence that the cytoskeleton may have a positive role in ripening as components of this pathway were down-regulated by MaMADS2 suppression. The mode of cytoskeleton involvement in fruit ripening remains unclear but presents a novel new frontier in ripening investigations. In summary, this project yielded functional understanding of the role and mode of action of MaMADS2 during ripening, pointing to both induction of ethylene and suppression of non-ethylene hormonal singling pathways. Furthermore, our data suggest important roles for cytoskeleton components and MaMADS5 in the overall banana ripening control network. Implications: The project revealed new molecular components/genes involved in banana ripening and refines our understanding of ripening responses in the peel and pulp tissues of this important species. This information is novel as compared to that derived from the more uniform carpel tissues of other highly studied ripening systems including tomato and grape. The work provides specific target genes for potential modification through genetic engineering or for exploration of useful genetic diversity in traditional breeding. The results from the project might point toward improved methods or new treatments to improve banana fruit storage and quality.
APA, Harvard, Vancouver, ISO, and other styles
3

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
4

Maletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/ulfp1679.

Full text
Abstract:
Post-shipment on-site inspections and international assistance in physical security and stockpile management (PSSM) have different scopes and objectives. On-site inspections allow exporting states to check exported military materiel to ensure that the importer is complying with its commitments, while PSSM assistance aims to improve states’ weapons and ammunition management systems. However, both instruments allow foreign specialists to visit a state’s weapons and ammunition storage facilities and enable information gathering to assess their integrity and identify possible diversion risks. This policy brief highlights that building informal linkages between these instruments, especially with regard to states and actors that conduct inspections and are involved in funding or implementing PSSM assistance, could contribute towards establishing more comprehensive forms of post-shipment cooperation. In addition, applying lessons learned from PSSM assistance in terms of gaining access to states’ facilities, cooperating with the beneficiary importing states, and identifying limitations and opportunities associated with the use of tracking technologies could help to address some of the challenges encountered when conducting on-site inspections. PSSM assistance programmes could also include modules to raise awareness about on-site inspections and be a source of expertise that could assist states when implementing these controls.
APA, Harvard, Vancouver, ISO, and other styles
5

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography