Добірка наукової літератури з теми "Security of private data"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security of private data".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security of private data"
Kapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Повний текст джерелаAlqadi, Ziad, and Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY." International Journal of Engineering Technologies and Management Research 7, no. 9 (September 21, 2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.
Повний текст джерелаHussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.
Повний текст джерелаSrinivasu, N., Masood Sahil, Jeevan Francis, and Sure Pravallika. "Security enhanced using honey encryption for private data sharing in cloud." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 675. http://dx.doi.org/10.14419/ijet.v7i1.1.10826.
Повний текст джерелаGatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.
Повний текст джерелаDeb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani, and Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique." Mathematical Problems in Engineering 2022 (February 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.
Повний текст джерелаAvant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Повний текст джерелаCoutu, Sylvain, Inbal Becker-Reshef, Alyssa K. Whitcraft, and Chris Justice. "Food security: underpin with public and private data sharing." Nature 578, no. 7796 (February 2020): 515. http://dx.doi.org/10.1038/d41586-020-00241-y.
Повний текст джерелаHennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber, and A. C. Nelson. "Data-centric security: Integrating data privacy and data security." IBM Journal of Research and Development 53, no. 2 (March 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.
Повний текст джерелаPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Повний текст джерелаДисертації з теми "Security of private data"
Basciftci, Yuksel O. Basciftci. "Private and Secure Data Communication: Information Theoretic Approach." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.
Повний текст джерелаLai, Ka-ying. "Solving multiparty private matching problems using Bloom-filters." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37854847.
Повний текст джерелаLai, Ka-ying, and 黎家盈. "Solving multiparty private matching problems using Bloom-filters." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37854847.
Повний текст джерелаDeYoung, Mark E. "Privacy Preserving Network Security Data Analytics." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82909.
Повний текст джерелаPh. D.
Huang, Xueli. "Achieving Data Privacy and Security in Cloud." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/372805.
Повний текст джерелаPh.D.
The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud computing. The traditional method to protect the data privacy is to encrypt data before they are sent to public cloud, but heavy computation is always introduced by this approach, especially for the image and video data, which has much more amount of data than text data. Another way is to take advantage of hybrid cloud by separating the sensitive data from non-sensitive data and storing them in trusted private cloud and un-trusted public cloud respectively. But if we adopt the method directly, all the images and videos containing sensitive data have to be stored in private cloud, which makes this method meaningless. Moreover, the emergence of the Software-Defined Networking (SDN) paradigm, which decouples the control logic from the closed and proprietary implementations of traditional network devices, enables researchers and practitioners to design new innovative network functions and protocols in a much easier, flexible, and more powerful way. The data plane will ask the control plane to update flow rules when the data plane gets new network packets with which it does not know how to deal with, and the control plane will then dynamically deploy and configure flow rules according to the data plane's requests, which makes the whole network could be managed and controlled efficiently. However, this kind of reactive control model could be used by hackers launching Distributed Denial-of-Service (DDoS) attacks by sending large amount of new requests from the data plane to the control plane. For image data, we divide the image is into pieces with equal size to speed up the encryption process, and propose two kinds of method to cut the relationship between the edges. One is to add random noise in each piece, the other is to design a one-to-one mapping function for each piece to map different pixel value into different another one, which cuts off the relationship between pixels as well the edges. Our mapping function is given with a random parameter as inputs to make each piece could randomly choose different mapping. Finally, we shuffle the pieces with another random parameter, which makes the problems recovering the shuffled image to be NP-complete. For video data, we propose two different methods separately for intra frame, I-frame, and inter frame, P-frame, based on their different characteristic. A hybrid selective video encryption scheme for H.264/AVC based on Advanced Encryption Standard (AES) and video data themselves is proposed for I-frame. For each P-slice of P-frame, we only abstract small part of them in private cloud based on the characteristic of intra prediction mode, which efficiently prevents P-frame being decoded. For cloud running with SDN, we propose a framework to keep the controller away from DDoS attack. We first predict the amount of new requests for each switch periodically based on its previous information, and the new requests will be sent to controller if the predicted total amount of new requests is less than the threshold. Otherwise these requests will be directed to the security gate way to check if there is a attack among them. The requests that caused the dramatic decrease of entropy will be filter out by our algorithm, and the rules of these request will be made and sent to controller. The controller will send the rules to each switch to make them direct the flows matching with the rules to honey pot.
Temple University--Theses
Ma, Jianjie. "Learning from perturbed data for privacy-preserving data mining." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/j%5Fma%5F080406.pdf.
Повний текст джерелаLincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Повний текст джерелаMolema, Karabo Omphile. "The conflict of interest between data sharing and data privacy : a middleware approach." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2415.
Повний текст джерелаPeople who are referred to as data owners in this study, use the Internet for various purposes and one of those is using online services like Gmail, Facebook, Twitter and so on. These online services are offered by organizations which are referred to as data controllers. When data owners use these service provided by data controllers they usually have to agree to the terms and conditions which gives data controllers indemnity against any privacy issues that may be raised by the data owner. Data controllers are then free to share that data with any other organizations, referred to as third parties. Though data controllers are protected from lawsuits it does not necessarily mean they are free of any act that may be considered a privacy violation by the data owner. This thesis aims to arrive at a design proposition using the design science research paradigm for a middleware extension, specifically focused on the Tomcat server which is a servlet engine running on the JVM. The design proposition proposes a client side annotation based API to be used by developers to specify classes which will carry data outside the scope of the data controller's system to a third party system, the specified classes will then have code weaved in that will communicate with a Privacy Engine component that will determine based on data owner's preferences if their data should be shared or not. The output of this study is a privacy enhancing platform that comprises of three components the client side annotation based API used by developers, an extension to Tomcat and finally a Privacy Engine.
Wernberg, Max. "Security and Privacy of Controller Pilot Data Link Communication." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-156337.
Повний текст джерелаGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Повний текст джерела“Cloud computing”, eller “molntjänster” som blivit den vanligaste svenska översättningen, har stor potential. Molntjänster kan tillhandahålla exaktden datakraft som efterfrågas, nästan oavsett hur stor den är; dvs. molntjäns-ter möjliggör vad som brukar kallas för “elastic computing”. Effekterna avmolntjänster är revolutionerande inom många områden av datoranvändning.Jämfört med tidigare metoder för databehandling ger molntjänster mångafördelar; exempelvis tillgänglighet av automatiserade verktyg för att monte-ra, ansluta, konfigurera och re-konfigurera virtuella resurser “allt efter behov”(“on-demand”). Molntjänster gör det med andra ord mycket lättare för or-ganisationer att uppfylla sina målsättningar. Men det paradigmskifte, sominförandet av molntjänster innebär, skapar även säkerhetsproblem och förutsätter noggranna integritetsbedömningar. Hur bevaras det ömsesidiga förtro-endet, hur hanteras ansvarsutkrävandet, vid minskade kontrollmöjligheter tillföljd av delad information? Följaktligen behövs molnplattformar som är såkonstruerade att de kan hantera känslig information. Det krävs tekniska ochorganisatoriska hinder för att minimera risken för dataintrång, dataintrångsom kan resultera i enormt kostsamma skador såväl ekonomiskt som policymässigt. Molntjänster kan innehålla känslig information från många olikaområden och domäner. Hälsodata är ett typiskt exempel på sådan information. Det är uppenbart att de flesta människor vill att data relaterade tillderas hälsa ska vara skyddad. Så den ökade användningen av molntjänster påsenare år har medfört att kraven på integritets- och dataskydd har skärptsför att skydda individer mot övervakning och dataintrång. Exempel på skyd-dande lagstiftning är “EU Data Protection Directive” (DPD) och “US HealthInsurance Portability and Accountability Act” (HIPAA), vilka båda kräverskydd av privatlivet och bevarandet av integritet vid hantering av informa-tion som kan identifiera individer. Det har gjorts stora insatser för att utvecklafler mekanismer för att öka dataintegriteten och därmed göra molntjänsternasäkrare. Exempel på detta är; kryptering, “trusted platform modules”, säker“multi-party computing”, homomorfisk kryptering, anonymisering, container-och “sandlåde”-tekniker.Men hur man korrekt ska skapa användbara, integritetsbevarande moln-tjänster för helt säker behandling av känsliga data är fortfarande i väsentligaavseenden ett olöst problem på grund av två stora forskningsutmaningar. Fördet första: Existerande integritets- och dataskydds-lagar kräver transparensoch noggrann granskning av dataanvändningen. För det andra: Bristande kän-nedom om en rad kommande och redan existerande säkerhetslösningar för att skapa effektiva molntjänster.Denna avhandling fokuserar på utformning och utveckling av system ochmetoder för att hantera känsliga data i molntjänster på lämpligaste sätt.Målet med de framlagda lösningarna är att svara de integritetskrav som ställsi redan gällande lagstiftning, som har som uttalad målsättning att skyddaindividers integritet vid användning av molntjänster.Vi börjar med att ge en överblick av de viktigaste begreppen i molntjäns-ter, för att därefter identifiera problem som behöver lösas för säker databe-handling vid användning av molntjänster. Avhandlingen fortsätter sedan med en beskrivning av bakgrundsmaterial och en sammanfattning av befintligasäkerhets- och integritets-lösningar inom molntjänster.Vårt främsta bidrag är en ny metod för att simulera integritetshot vidanvändning av molntjänster, en metod som kan användas till att identifierade integritetskrav som överensstämmer med gällande dataskyddslagar. Vårmetod används sedan för att föreslå ett ramverk som möter de integritetskravsom ställs för att hantera data inom området “genomik”. Genomik handlari korthet om hälsodata avseende arvsmassan (DNA) hos enskilda individer.Vårt andra större bidrag är ett system för att bevara integriteten vid publice-ring av biologiska provdata. Systemet har fördelen att kunna sammankopplaflera olika uppsättningar med data. Avhandlingen fortsätter med att före-slå och beskriva ett system kallat ScaBIA, ett integritetsbevarande systemför hjärnbildsanalyser processade via molntjänster. Avhandlingens avslutan-de kapitel beskriver ett nytt sätt för kvantifiering och minimering av risk vid“kernel exploitation” (“utnyttjande av kärnan”). Denna nya ansats är ävenett bidrag till utvecklingen av ett nytt system för (Call interposition referencemonitor for Lind - the dual layer sandbox).
QC 20160516
Книги з теми "Security of private data"
Salomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.
Повний текст джерелаRao, Udai Pratap, Sankita J. Patel, Pethuru Raj, and Andrea Visconti, eds. Security, Privacy and Data Analytics. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9089-1.
Повний текст джерелаPrivacy and data security law deskbook. [Frederick, MD]: Aspen Publishers, 2010.
Знайти повний текст джерелаLivraga, Giovanni, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47072-6.
Повний текст джерелаGarcia-Alfaro, Joaquin, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, and Security Assurance. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29883-2.
Повний текст джерелаGarcia-Alfaro, Joaquin, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, eds. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9.
Повний текст джерелаCavanagh, Thomas E. Preparedness in the private sector. [New York?]: The Conference Board, 2008.
Знайти повний текст джерелаservice), SpringerLink (Online, ed. Quantum private communication. Beijing: Higher Education Press, 2010.
Знайти повний текст джерелаInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Знайти повний текст джерелаKaufman, Charlie. Network security: Private communication in a public world. Englewood Cliffs, New Jersey: PTR Prentice Hall, 1995.
Знайти повний текст джерелаЧастини книг з теми "Security of private data"
Zhu, Tianqing, Gang Li, Wanlei Zhou, and Philip S. Yu. "Differentially Private Data Analysis." In Advances in Information Security, 49–65. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62004-6_6.
Повний текст джерелаKursawe, Klaus, Gregory Neven, and Pim Tuyls. "Private Policy Negotiation." In Financial Cryptography and Data Security, 81–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_6.
Повний текст джерелаAlderman, James, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, and Jordi Ribes-González. "Private Outsourced Kriging Interpolation." In Financial Cryptography and Data Security, 75–90. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_5.
Повний текст джерелаGoh, Eu-Jin, and Philippe Golle. "Event Driven Private Counters." In Financial Cryptography and Data Security, 313–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11507840_27.
Повний текст джерелаBarth, Adam, Dan Boneh, and Brent Waters. "Privacy in Encrypted Content Distribution Using Private Broadcast Encryption." In Financial Cryptography and Data Security, 52–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_4.
Повний текст джерелаAbadi, Aydin, Sotirios Terzis, and Changyu Dong. "VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets." In Financial Cryptography and Data Security, 149–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-54970-4_9.
Повний текст джерелаChing Wa, Daniel. "Software and Data Segregation Security." In Security in the Private Cloud, 73–86. Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315372211-6.
Повний текст джерелаResende, Amanda C. Davi, and Diego F. Aranha. "Faster Unbalanced Private Set Intersection." In Financial Cryptography and Data Security, 203–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-58387-6_11.
Повний текст джерелаGolle, Philippe. "A Private Stable Matching Algorithm." In Financial Cryptography and Data Security, 65–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_5.
Повний текст джерелаCamenisch, Jan, and Gregory M. Zaverucha. "Private Intersection of Certified Sets." In Financial Cryptography and Data Security, 108–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03549-4_7.
Повний текст джерелаТези доповідей конференцій з теми "Security of private data"
MINCĂ, Ioana-Cătălina. "Private Data Security in Social Networks." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.06.
Повний текст джерелаHossain, Md Tamjid, Shahriar Badsha, and Haoting Shen. "Privacy, Security, and Utility Analysis of Differentially Private CPES Data." In 2021 IEEE Conference on Communications and Network Security (CNS). IEEE, 2021. http://dx.doi.org/10.1109/cns53000.2021.9705022.
Повний текст джерелаCampbell, Zachary, Andrew Bray, Anna Ritz, and Adam Groce. "Differentially Private ANOVA Testing." In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018. http://dx.doi.org/10.1109/icdis.2018.00052.
Повний текст джерелаBakas, Alexandros, Antonis Michalas, and Tassos Dimitriou. "Private Lives Matter." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508398.3511514.
Повний текст джерелаEigner, Fabienne, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, and Aniket Kate. "Differentially private data aggregation with optimal utility." In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664263.
Повний текст джерелаMishra, Menaka, and A. K. Upadhyay. "Need of Private and Public Sector Information Security." In 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2019. http://dx.doi.org/10.1109/confluence.2019.8776945.
Повний текст джерелаPerrier, Victor, Hassan Jameel Asghar, and Dali Kaafar. "Private Continual Release of Real-Valued Data Streams." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23535.
Повний текст джерелаLipps, Christoph, Sachinkumar Bavikatti Mallikarjun, Matthias Strufe, Christopher Heinz, Christoph Grimm, and Hans Dieter Schotten. "Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles." In 2020 3rd International Conference on Data Intelligence and Security (ICDIS). IEEE, 2020. http://dx.doi.org/10.1109/icdis50059.2020.00019.
Повний текст джерелаSu, Dong, Jianneng Cao, Ninghui Li, Elisa Bertino, and Hongxia Jin. "Differentially Private K-Means Clustering." In CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2857705.2857708.
Повний текст джерелаAnandan, Balamurugan, and Chris Clifton. "Differentially Private Feature Selection for Data Mining." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3180445.3180452.
Повний текст джерелаЗвіти організацій з теми "Security of private data"
Warren, David R., Michael A. Bianco, Waheed Nasser, Richard R. Kusman, James Shafer, Jason Venner, Lovell Q. Walls, and Samson J. Wright. Agencies Need Improved Financial Data Reporting for Private Security Contractors. Fort Belvoir, VA: Defense Technical Information Center, October 2008. http://dx.doi.org/10.21236/ada489769.
Повний текст джерелаVonk, Jaynie. Going Digital: Privacy and data security under GDPR for quantitative impact evaluation. Oxfam, October 2019. http://dx.doi.org/10.21201/2019.5211.
Повний текст джерелаFlagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.
Повний текст джерелаMutis, Santiago. Privately Held AI Companies by Sector. Center for Security and Emerging Technology, October 2020. http://dx.doi.org/10.51593/20200019.
Повний текст джерелаTowery, Bobby A. Phasing Out Private Security Contractors in Iraq. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada449415.
Повний текст джерелаDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.
Повний текст джерелаFang, L., ed. Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4111.
Повний текст джерелаEfflandt, Scott L. Under Siege: How Private Security Companies Threaten the Military Profession. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589194.
Повний текст джерелаBrown, Charles W. Control of Private Security Contractors by the Joint Force Commander. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada483966.
Повний текст джерелаMayle, Ashley. Blockchain based Communication Architectures with Applications to Private Security Networks. Office of Scientific and Technical Information (OSTI), November 2020. http://dx.doi.org/10.2172/1720211.
Повний текст джерела