Artigos de revistas sobre o tema "Information storage and retrieval systems - security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Information storage and retrieval systems - security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Arunarani, Ar, e D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases". International Journal of Intelligent Information Technologies 14, n.º 1 (janeiro de 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Texto completo da fonteKovalcik, Justin, e Mike Villalobos. "Automated Storage & Retrieval System". Information Technology and Libraries 38, n.º 4 (16 de dezembro de 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.
Texto completo da fonteBidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade e Suprakash Sudarsanan Nair. "Patient data management using blockchain technology". Indonesian Journal of Electrical Engineering and Computer Science 32, n.º 3 (1 de dezembro de 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.
Texto completo da fonteShojaei, Parisasadat, Elena Vlahu-Gjorgievska e Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review". Computers 13, n.º 2 (31 de janeiro de 2024): 41. http://dx.doi.org/10.3390/computers13020041.
Texto completo da fonteXie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao e Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage". Security and Communication Networks 2018 (6 de junho de 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.
Texto completo da fontePing, Yuan, Wei Song, Zhili Zhang, Weiping Wang e Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data". Information 11, n.º 8 (12 de agosto de 2020): 394. http://dx.doi.org/10.3390/info11080394.
Texto completo da fonteFolasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa e Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review". European Journal of Electrical Engineering and Computer Science 7, n.º 6 (13 de novembro de 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.
Texto completo da fonteZhang, Qiuyu, Minrui Fu, Yibo Huang e Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage". Security and Communication Networks 2022 (30 de março de 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.
Texto completo da fonteLi, Weijing, Zicheng Zhou, Wen Fan e Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology". Wireless Communications and Mobile Computing 2022 (13 de julho de 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Texto completo da fonteTaipalus, Toni, Hilkka Grahn, Hannu Turtiainen e Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security". European Conference on Cyber Warfare and Security 23, n.º 1 (21 de junho de 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.
Texto completo da fonteGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar e Sanket Ghadge. "Survey on Medical Data Storage Systems". International Journal of Soft Computing and Engineering 11, n.º 1 (30 de setembro de 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Texto completo da fonteHamid, Yasir, Rameez Yousuf e Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology". Journal of Information Security and Cybercrimes Research 6, n.º 1 (30 de junho de 2023): 24–39. http://dx.doi.org/10.26735/qbij3667.
Texto completo da fonteRashid, Mustafa Noori, Leith Hamid Abed e Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture". Bulletin of Electrical Engineering and Informatics 11, n.º 6 (1 de dezembro de 2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.
Texto completo da fonteGupta, Daya Sagar, e G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, n.º 3 (julho de 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Texto completo da fonteZhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining". Electronics 13, n.º 14 (19 de julho de 2024): 2852. http://dx.doi.org/10.3390/electronics13142852.
Texto completo da fonteAlsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady e Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval". Bulletin of Electrical Engineering and Informatics 11, n.º 2 (1 de abril de 2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.
Texto completo da fonteShyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey e Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management". Journal of Cybersecurity and Information Management 13, n.º 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.
Texto completo da fonteAl-Mayali, Yahya Mahdi Hadi, e Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time". BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.
Texto completo da fonteMishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu e Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES". EPH - International Journal of Medical and Health Science 8, n.º 2 (11 de junho de 2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.
Texto completo da fonteN. Mhawi, Doaa, Haider W. Oleiwi e Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser". Journal of Techniques 5, n.º 2 (26 de junho de 2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.
Texto completo da fonteDing, Yong, Hui Xu, Yujue Wang, Fang Yuan e Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks". Security and Communication Networks 2021 (29 de setembro de 2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.
Texto completo da fonteMaosa, Herbert, Karim Ouazzane e Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework". International Journal of Information Security and Privacy 16, n.º 1 (1 de janeiro de 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Texto completo da fonteSantiañez, Reymon M., e Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System". American Journal of Agricultural Science, Engineering and Technology 5, n.º 2 (29 de novembro de 2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.
Texto completo da fonteBudati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi e Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks". Electronics 12, n.º 7 (30 de março de 2023): 1638. http://dx.doi.org/10.3390/electronics12071638.
Texto completo da fonteLazim Lafta, Ali, e Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval". Bulletin of Electrical Engineering and Informatics 11, n.º 5 (1 de outubro de 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.
Texto completo da fonteDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng e Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing". Security and Communication Networks 2022 (15 de outubro de 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Texto completo da fonteAbida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"". Journal of Electrical Systems 20, n.º 7s (4 de maio de 2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.
Texto completo da fonteKumar Barai, Dilip, G. Sridevi, Syed Umar e MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey". Indonesian Journal of Electrical Engineering and Computer Science 1, n.º 2 (1 de fevereiro de 2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.
Texto completo da fonteMei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang e Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques". International Journal of Web Services Research 20, n.º 1 (5 de outubro de 2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.
Texto completo da fonteD. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de novembro de 2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.
Texto completo da fonteJain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal e Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence". Wireless Communications and Mobile Computing 2022 (6 de maio de 2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.
Texto completo da fonteThigale, Satyam R. "Multiple Keyword Search in Cloud Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (9 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Texto completo da fonteFATIEIEVA, Anastasiia. "Information systems in the enterprise's management". Economics. Finances. Law, n.º 6/1 (26 de junho de 2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.
Texto completo da fonteAl-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 11 (30 de novembro de 2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.
Texto completo da fonteGouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação". RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, n.º 1 (30 de janeiro de 2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.
Texto completo da fonteJayathissa, Prabath, e Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case". European Modern Studies Journal 7, n.º 6 (1 de fevereiro de 2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.
Texto completo da fonteYe, Xubo, e Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics". Journal of Information Systems Engineering and Management 8, n.º 3 (29 de novembro de 2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.
Texto completo da fonteKumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal e Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models". Computational Intelligence and Neuroscience 2022 (19 de março de 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.
Texto completo da fonteWang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding e Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application". JMIR Medical Informatics 10, n.º 4 (13 de abril de 2022): e36481. http://dx.doi.org/10.2196/36481.
Texto completo da fonteReddy, Vonteru Srikanth, e Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 7s (13 de julho de 2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Texto completo da fonteRakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti e Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model". Diplomatika: Jurnal Kearsipan Terapan 5, n.º 1 (11 de janeiro de 2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.
Texto completo da fonteZhao, Meng, e Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds". Security and Communication Networks 2022 (11 de outubro de 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.
Texto completo da fonteChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing e Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing". Security and Communication Networks 2021 (20 de janeiro de 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Texto completo da fonteShinkar, Sonali V., e Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 10, n.º 1s (10 de dezembro de 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Texto completo da fonteBommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu e Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9s (31 de agosto de 2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.
Texto completo da fonteSumahasan, S., e D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9s (31 de agosto de 2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.
Texto completo da fonteAnokhina, T. Y., e T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS". KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, n.º 2 (fevereiro de 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.
Texto completo da fonteFu, Siyi, e Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System". Security and Communication Networks 2022 (18 de maio de 2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.
Texto completo da fonteZhang, Ping, Jinbo Li e Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment". Information 13, n.º 6 (24 de maio de 2022): 265. http://dx.doi.org/10.3390/info13060265.
Texto completo da fonteTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu e Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12 de fevereiro de 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Texto completo da fonte