Journal articles on the topic 'Information storage and retrieval systems - security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information storage and retrieval systems - security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arunarani, Ar, and D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases." International Journal of Intelligent Information Technologies 14, no. 1 (January 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Full textKovalcik, Justin, and Mike Villalobos. "Automated Storage & Retrieval System." Information Technology and Libraries 38, no. 4 (December 16, 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Full textBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade, and Suprakash Sudarsanan Nair. "Patient data management using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (December 1, 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Full textShojaei, Parisasadat, Elena Vlahu-Gjorgievska, and Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review." Computers 13, no. 2 (January 31, 2024): 41. http://dx.doi.org/10.3390/computers13020041.
Full textXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao, and Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage." Security and Communication Networks 2018 (June 6, 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Full textPing, Yuan, Wei Song, Zhili Zhang, Weiping Wang, and Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data." Information 11, no. 8 (August 12, 2020): 394. http://dx.doi.org/10.3390/info11080394.
Full textFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa, and Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review." European Journal of Electrical Engineering and Computer Science 7, no. 6 (November 13, 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Full textZhang, Qiuyu, Minrui Fu, Yibo Huang, and Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage." Security and Communication Networks 2022 (March 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Full textLi, Weijing, Zicheng Zhou, Wen Fan, and Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology." Wireless Communications and Mobile Computing 2022 (July 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Full textTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen, and Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Full textGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Full textHamid, Yasir, Rameez Yousuf, and Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 30, 2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Full textRashid, Mustafa Noori, Leith Hamid Abed, and Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Full textGupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (July 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Full textZhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining." Electronics 13, no. 14 (July 19, 2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Full textAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady, and Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval." Bulletin of Electrical Engineering and Informatics 11, no. 2 (April 1, 2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Full textShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey, and Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Full textAl-Mayali, Yahya Mahdi Hadi, and Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time." BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Full textMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu, and Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES." EPH - International Journal of Medical and Health Science 8, no. 2 (June 11, 2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Full textN. Mhawi, Doaa, Haider W. Oleiwi, and Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser." Journal of Techniques 5, no. 2 (June 26, 2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Full textDing, Yong, Hui Xu, Yujue Wang, Fang Yuan, and Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks." Security and Communication Networks 2021 (September 29, 2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Full textMaosa, Herbert, Karim Ouazzane, and Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Full textSantiañez, Reymon M., and Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System." American Journal of Agricultural Science, Engineering and Technology 5, no. 2 (November 29, 2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Full textBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi, and Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks." Electronics 12, no. 7 (March 30, 2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Full textLazim Lafta, Ali, and Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval." Bulletin of Electrical Engineering and Informatics 11, no. 5 (October 1, 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Full textDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Full textAbida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"." Journal of Electrical Systems 20, no. 7s (May 4, 2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Full textKumar Barai, Dilip, G. Sridevi, Syed Umar, and MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey." Indonesian Journal of Electrical Engineering and Computer Science 1, no. 2 (February 1, 2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Full textMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang, and Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques." International Journal of Web Services Research 20, no. 1 (October 5, 2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Full textD. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Full textJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal, and Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Full textThigale, Satyam R. "Multiple Keyword Search in Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Full textFATIEIEVA, Anastasiia. "Information systems in the enterprise's management." Economics. Finances. Law, no. 6/1 (June 26, 2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Full textAl-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (November 30, 2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Full textGouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação." RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, no. 1 (January 30, 2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Full textJayathissa, Prabath, and Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case." European Modern Studies Journal 7, no. 6 (February 1, 2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Full textYe, Xubo, and Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics." Journal of Information Systems Engineering and Management 8, no. 3 (November 29, 2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Full textKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal, and Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models." Computational Intelligence and Neuroscience 2022 (March 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Full textWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding, and Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application." JMIR Medical Informatics 10, no. 4 (April 13, 2022): e36481. http://dx.doi.org/10.2196/36481.
Full textReddy, Vonteru Srikanth, and Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Full textRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti, and Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model." Diplomatika: Jurnal Kearsipan Terapan 5, no. 1 (January 11, 2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Full textZhao, Meng, and Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Full textChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Full textShinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Full textBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu, and Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Full textSumahasan, S., and D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Full textAnokhina, T. Y., and T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS." KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, no. 2 (February 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Full textFu, Siyi, and Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System." Security and Communication Networks 2022 (May 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Full textZhang, Ping, Jinbo Li, and Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment." Information 13, no. 6 (May 24, 2022): 265. http://dx.doi.org/10.3390/info13060265.
Full textTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function." Security and Communication Networks 2021 (February 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Full text