Добірка наукової літератури з теми "Support secure data processing"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Support secure data processing".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Support secure data processing"

1

Sun, Yan, and Shambhu Upadhyaya. "Secure and privacy preserving data processing support for active authentication." Information Systems Frontiers 17, no. 5 (July 29, 2015): 1007–15. http://dx.doi.org/10.1007/s10796-015-9587-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jariwala, Vivaksha, Himanshu Patel, Parth Patel, and Devesh C. Jinwala. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." International Journal of Distributed Systems and Technologies 5, no. 3 (July 2014): 77–99. http://dx.doi.org/10.4018/ijdst.2014070104.

Повний текст джерела
Анотація:
Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is based on a zero configuration protocol that supports a generation of a defined aggregation topology and a key exchange procedure. This work supports the framework with detailed security analysis and performance evaluation on TinyOS platform using TOSSIM as the base simulator. Through humble observations, this is an unique attempt that integrates the support for security features, topology generation and key management in a single, secure data aggregation protocol; substantiating the proposal with elaborate experimental evaluation, too.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.

Повний текст джерела
Анотація:
In Wireless Sensor Networks (WSNs), server clusters, and other systems requiring secure transmission, the overhead of data encryption and transmission is often not negligible. Unfortunately, a conflict exists between security and efficiency in processing data. Therefore, this paper proposes a strategy to overcome this conflict, called Client-Aware Negotiation for Secure and Efficient Data Transmission (CAN-SEAT). This strategy allows a client with different security transmission requirements to use the appropriate data security transmission without modifying the client. Two methods are designed for different clients. The first method is based on two-way authentication and renegotiation. After handshakes, the appropriate data security transmission scheme is selected according to the client requirements. Another method is based on redirection, which can be applied when the client does not support two-way authentication or renegotiation. For the characteristics of different architecture, this paper classifies and discusses symmetric key algorithms, asymmetric key algorithms, and hardware encryption instructions. In four application scenarios, the CAN-SEAT strategy is tested. Compared with the general transmission strategy, when only software encryption is used, the data processing and transmission cost can be reduced by 89.41% in the best case and by 15.40% in the worst case. When supporting hardware encryption, the cost can be reduced by 85.30% and 24.63%, respectively. A good effect was produced on the experimental platforms XiLinx, FT-2000+, and Intel processors. To the best of our knowledge, for Client-Aware Negotiation (CAN), this is the first method to be successfully deployed on a general system. CAN-SEAT can be easily combined with other energy-efficient strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Seniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.

Повний текст джерела
Анотація:
Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable price even cheaper than the Arduino board has the opportunity to build secure data communication using SSL protocol based on MbedTLS library. In addition to wiznet W5100/W5500 ethernet shield, an STM32F103 SSL client device has been successfully built in this study. The SSL client device supports ECDHE ECDHA AES128 CBC SHA256 SSL cipher suite. The Apache web server must also be configured to support this cipher suite by generating OpenSSL ECC (elliptic curve cryptography) certificate. The system was tested with the LM35 analog temperature sensor, and as a result, the STM32F103 SSL client has successfully secured the data transmission to the Apache SSL web server. The communication time was 3 seconds for the first connection and 42 ms for the next data transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Marwan, Mbarek, Ali Karti, and Hassan Ouahmane. "Proposal for a Secure Data Sharing and Processing in Cloud Applications for Healthcare Domain." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 1 (January 31, 2021): 10–17. http://dx.doi.org/10.52502/ijitas.v3i1.15.

Повний текст джерела
Анотація:
Information Technology (IT) services have become an inherent component in almost all sectors. Similarly, the health sector has been recently integrating IT to meet the growing demand for medical data exchange and storage. Currently, cloud has become a real hosting alternative for traditional on-permise software. In this model, not only do health organizations have access to a wide range of services but most importantly they are charged based on the usage of these cloud applications. However, especially in the healthcare domain, cloud computing deems challenging as to the sensitivity of health data. This work aims at improving access to medical data and securely sharing them across healthcare professionals, allowing real-time collaboration. From these perspectives, they propose a hybrid cryptosystem based on AES and Paillier to prevent the disclosure of confidential data, as well as computing encrypted data. Unlike most other solutions, the proposed framework adopts a proxy-based architecture to tackle some issues regarding privacy concerns and access control. Subsequently, this system typically guarantees that only authorized users can view or use specific resources in a computing environment. To this aim, they use eXtensible Access Control Markup Language (XACML) standard to properly design and manage access control policies. In this study, they opt for the (Abbreviated Language for Authorization) ALFA tool to easily formulate XACML policies and define complex rules. The simulation results show that the proposal offers simple and efficient mechanisms for the secure use of cloud services within the healthcare domain. Consequently, this framework is an appropriate method to support collaboration among all entities involved in medical information exchange.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Alenezi, Mamdouh, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan. "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 14–31. http://dx.doi.org/10.4018/ijisp.2019040102.

Повний текст джерела
Анотація:
NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, and Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms." Entropy 24, no. 4 (April 6, 2022): 519. http://dx.doi.org/10.3390/e24040519.

Повний текст джерела
Анотація:
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Alsaig, Alaa, Vangalur Alagar, Zaki Chammaa, and Nematollaah Shiri. "Characterization and Efficient Management of Big Data in IoT-Driven Smart City Development." Sensors 19, no. 11 (May 28, 2019): 2430. http://dx.doi.org/10.3390/s19112430.

Повний текст джерела
Анотація:
Smart city is an emerging initiative for integrating Information and Communication Technologies (ICT) in effective ways to support development of smart cities with enhanced quality of life for its citizens through safe and secure context-aware services. Major technical challenges to realize smart cities include resource use optimization, service delivery without interruption at all times in all aspects, minimization of costs, and reduction of resource consumption. To address these challenges, new techniques and technologies are required for modeling and processing the big data generated and used through the underlying Internet of Things (IoT). To this end, we propose a data-centric approach to IoT in conceptualizing the “things” from a service-oriented perspective and investigate efficient ways to identify, integrate, and manage big data. The data-centric approach is expected to better support efficient management of data with complexities inherent in IoT-generated big data. Furthermore, it supports efficient and scalable query processing and reasoning techniques required in development of smart city applications. This article redresses the literature and contributes to the foundations of smart cities applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Meister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (September 9, 2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.

Повний текст джерела
Анотація:
In this paper, we investigate how digital forensics tools can support digital curation tasks around the acquisition, processing, management and analysis of born-digital materials. Using a real world born-digital collection as our use case, we describe how BitCurator, a digital forensics open source software environment, supports fundamental curatorial activities such as secure data transfer, assurance of authenticity and integrity, and the identification and elimination of private and/or sensitive information. We also introduce a workflow diagram that articulates the processing steps for institutions processing born-digital materials. Finally, we review possibilities for further integration, development and use of digital forensic tools.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.

Повний текст джерела
Анотація:
IoT devices provide with real-time data to a rich ecosystems of services and applications that will be of uttermost importance for ubiquitous computing. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core netkworks. Designers may opt for microservice architectures and fog computing to address this challenge while offering the required flexibility for the main players of ubiquitous computing: nomadic users. Microservices require strong security support for Fog computing, to rely on nodes in the boundary of the network for secure data collection and processing. IoT low cost devices face outdated certificates and security support, due to the elapsed time from manufacture to deployment. In this paper we propose a solution based on microservice architectures and DNSSEC, DANE and chameleon signatures to overcome these difficulties. We will show how trap doors included in the certificates allow a secure and flexible delegation for off-loading data collection and processing to the fog. The main result is showing this requires minimal manufacture device configuration, thanks to DNSSEC support.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Support secure data processing"

1

Найда, Андрій Олегович. "Адаптивний механізм управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/35934.

Повний текст джерела
Анотація:
Дипломна робота: 66 с., 8 рис.,12 табл., 2 дод., 7 дж. Об’єкт дослідження – Адаптивні механізми управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах Програмний продукт – симуляційна програма для визначення шифрування та обробки повідомлень, мова програмування – C++. Мета роботи – дослідити методи реалізації адаптивних систем управління. Метод дослідження – опрацювання літератури та інших інформаційних джерел за даною темою, аналіз існуючих методів адаптивних механізмів управління.
Thesis: 66 p.,8 fig., 12 Table., 2 Appendix, 7 j. Object of study - Adaptive security management mechanisms to support secure data processing in distributed computer systems Software product - a simulation program for determining encryption and message processing, programming language - C ++. The purpose of the work is to investigate the methods of implementation of adaptive control systems. Research method - study of literature and other information sources on this topic, analysis of existing methods of adaptive management mechanisms.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.

Повний текст джерела
Анотація:
Graphs are powerful tools for a wide range of real applications, from Biological and Chemical Databases, Social Networks, Citation Networks to Knowledge Bases. Large graph data repositories have been consistently found in recent applications. Due to the high complexity of graph queries, e.g., NP-Completeness of subgraph query, and the lack of IT expertise, hosting efficient graph query services for the owners of graph data has been a technically challenging task. And hence, they may prefer to outsource their services to third-party service providers (SPs) for scalability, elasticity and efficiency. Unfortunately, SPs may not always be trusted. Security, typically the integrity and confidentiality, of the data, has been recognized as one of the critical attributes of Quality of Services (QoS). This directly influences the willingness of both data owners and query clients to use SP’s services. To address these concerns, this thesis proposes novel techniques to solve both authentication-aware and privacy-aware subgraph query. Firstly, we study authenticated subgraph query services (Chapter 3). To support the service, we propose Merkle IFTree (MIFTree) where Merkle hash trees are applied into our Intersection-aware Feature-subgraph Tree (IFTree). IFTree aims to minimize I/O in a well-received subgraph query paradigm namely the filtering-and-verification framework. The structures required to be introduced to verification objects (VOs) and the authentication time are minimized. Subsequently, the overall response time is minimized. For optimizations, we propose an enhanced authentication method on MIFTree. Secondly, we propose structure-preserving subgraph query services (Chapter 4). A crucial step of this part is to transform the seminal subgraph isomorphism algorithm (the Ullmann’s algorithm) into a series of matrix operations. We propose a novel cyclic group based encryption (CGBE) method for private matrix operations. We propose a protocol that involves the query client and static indexes for optimizations. We prove that the structural information of both query graph and data graph are preserved under CGBE and analyze the privacy preservation in the presence of the optimizations. Thirdly, we propose asymmetric structure-preserving subgraph query processing (Chapter 5), where the data graph is publicly known and the query structure/topology is kept secret. Unlike other previous methods for subgraph queries, this part proposes a series of novel optimizations that only exploit graph structures, not the queries. Further, we propose a robust query encoding and adopt our proposed cyclic group based encryption method, so that the query processing can be transformed into a series of private matrix operations and performed securely. The effectiveness and efficiency of all the techniques presented in this thesis are experimentally evaluated with both real-world and synthetic dataset
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.

Повний текст джерела
Анотація:
Thesis (M.S.)--West Virginia University, 2000.
Title from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Iwaya, Leonardo H. "Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-46982.

Повний текст джерела
Анотація:
Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. Accidental or deliberate data breaches of health data may lead to societal pressures, embarrassment and discrimination. Information security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance. This thesis consists of publications contributing to mHealth security and privacy in various ways: with a comprehensive literature review about mHealth in Brazil; with the design of a security framework for MDCSs (SecourHealth); with the design of a MDCS (GeoHealth); with the design of Privacy Impact Assessment template for MDCSs; and with the study of ontology-based obfuscation and anonymisation functions for health data.
Information security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.
Ramachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.

Повний текст джерела
Анотація:
As digital data-collection has increased in scale and number, it becomes an important type of resource serving a wide community of researchers. Cross-institutional data-sharing and collaboration introduce a suitable approach to facilitate those research institutions that are suffering the lack of data and related IT infrastructures. Grid computing has become a widely adopted approach to enable cross-institutional resource-sharing and collaboration. It integrates a distributed and heterogeneous collection of locally managed users and resources. This project proposes a distributed data warehouse system, which uses Grid technology to enable data-access and integration, and collaborative operations across multi-distributed institutions in the context of HV/AIDS research. This study is based on wider research into OGSA-based Grid services architecture, comprising a data-analysis system which utilizes a data warehouse, data marts, and near-line operational database that are hosted by distributed institutions. Within this framework, specific patterns for collaboration, interoperability, resource virtualization and security are included. The heterogeneous and dynamic nature of the Grid environment introduces a number of security challenges. This study also concerns a set of particular security aspects, including PKI-based authentication, single sign-on, dynamic delegation, and attribute-based authorization. These mechanisms, as supported by the Globus Toolkit’s Grid Security Infrastructure, are used to enable interoperability and establish trust relationship between various security mechanisms and policies within different institutions; manage credentials; and ensure secure interactions.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.

Повний текст джерела
Анотація:
Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kordale, Rammohan. "System support for scalable services." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8246.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Support secure data processing"

1

Marsh, David. Project support office: Or, project support assistant. London: Stationery Office, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Atluri, Vijay. Multilevel secure transaction processing. Boston: Kluwer Academic, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hale, Mark P. Implementing computing support centers. McKinney, Tex: Academic Computing Publications, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hodge, Gail M. Computer support to indexing. Philadelphia: National Federation of Abstracting and Information Services, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wallis, Louis A. Computer-based sales force support. New York, NY: Conference Board, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Guariso, Giorgio. Environmental decision support systems. Chichester [England]: E. Horwood, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Improving planning support: The use of planning support systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, Faculteit Geowetenschappen Universiteit Utrecht, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Vonk, Guido A. Improving planning support: The use of Planning Support Systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

United States. Internal Revenue Service. Operations support branch glossaries. [Washington, D.C.?]: Internal Revenue Service, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Support secure data processing"

1

Thuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Adversarial Support Vector Machine Learning." In Secure Data Science, 175–94. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Adaikkalavan, Raman, Indrakshi Ray, and Xing Xie. "Multilevel Secure Data Stream Processing." In Lecture Notes in Computer Science, 122–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22348-8_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Minowa, Tadashi, and Takeshi Takahashi. "Secure Distributed Storage for Bulk Data." In Neural Information Processing, 566–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_67.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Thuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Secure Cloud Query Processing Based on Access Control for Big Data Systems." In Secure Data Science, 267–93. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kokemüller, Jochen, Heiko Roßnagel, and Anette Weisbecker. "Secure Mobile Support of Independent Sales Agencies." In Lecture Notes in Business Information Processing, 169–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03132-8_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mann, Zoltán Ádám, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, and Paul Mundt. "Secure Data Processing in the Cloud." In Communications in Computer and Information Science, 149–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79090-9_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mine, Tsunenori, Kosaku Kimura, Satoshi Amamiya, Ken’ichi Takahashi, and Makoto Amamiya. "Agent-Community-Network-Based Secure Collaboration Support System." In Lecture Notes in Business Information Processing, 234–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01668-4_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sompolinsky, Yonatan, and Aviv Zohar. "Secure High-Rate Transaction Processing in Bitcoin." In Financial Cryptography and Data Security, 507–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_32.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Welzer, Tatjana, Marko Hölbl, Marjan Družovec, Brane Klopčič, Boštjan Brumen, Hannu Jaakkola, and Mirjam Bonačić. "Medical Personal Data in Secure Information Systems." In Lecture Notes in Business Information Processing, 340–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01112-2_35.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chavarría-Miranda, Daniel, John Mellor-Crummey, and Trushar Sarang. "Data-Parallel Compiler Support for Multipartitioning." In Euro-Par 2001 Parallel Processing, 241–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44681-8_36.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Support secure data processing"

1

Concepcion Leon, Adrian, and Markus Endler. "Secure distributed ledgers to support IoT technologies data." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7356.

Повний текст джерела
Анотація:
Blockchain and Tangle are data structures used to create an immutable public record of data insured by a network of peer-to-peer participants who maintain a set of constantly growing data records known as ledgers. Blockchain and Tangle technologies are a decentralized solution that guarantees the exchange of large amounts of trusted messages, among billions of connected IoT devices, which are very valuable as they are valid and complete. This highly encrypted and secure peer-to-peer messaging mechanism is adopted in this project to manage the processing of IoT transactions and the coordination between the devices that interact with the process. To maintain private transactions, secure and trustless, the distributed consensus algorithms are responsible for validating and choosing transactions and recording them in the global ledger. The results showed that the speed of the consensus algorithms can affect the creation in real time of reliable stories that track the events of the IoT networks. After incorporating Complex Event Processing that allows selecting only those high level events, it is possible to get an improvement in many situations. The result is a Middleware system that provides a framework for the construction of large-scale computer applications that use Complex Events Processing and different decentralized ledgers such as the blockchain of Ethereum or IOTA Tangle, for secure data storage.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chen, Hao, Lin Chen, Xiaoyun Kuang, Aidong Xu, and Yiwei Yang. "Support Forward Secure Smart Grid Data Deduplication and Deletion Mechanism." In 2021 2nd Asia Symposium on Signal Processing (ASSP). IEEE, 2021. http://dx.doi.org/10.1109/assp54407.2021.00019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tsai, Hanchung, Yung Y. Liu, and James Shuler. "RFID Technology for Environmental Remediation and Radioactive Waste Management." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40218.

Повний текст джерела
Анотація:
An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components—from fissionable stocks to radioactive wastes—has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event records, as well as a contents manifest. Gamma irradiation tests showed that the tag components possess significant radiation resistance. Long-life batteries and smart management circuitries permit the tags to operate for up to 10 years without battery replacement. The tags have a near universal form factor, i.e., they can fit different package types. The read range is up to >100 m with no line-of-sight required. With careful implementation, even a large-size processing or storage facility with a complex configuration can be monitored with a handful of readers in a network. In transportation, by incorporating Global Positioning System (GPS), satellite/cellular communication technology, and secure Internet, situation awareness is assured continuously. The RFID system, when integrated with Geographic Information System (GIS) technology, can promptly provide content- and event-specific information to first responders and emergency management teams in case of incidents. In stand-alone applications, the monitoring and tracking data are contained within the local computer. With a secure Internet, information can be shared within the complex or even globally in real time. As with the deployment of any new technology, overcoming the cultural resistance is part of the developmental process. With a strong institutional support and multiple successful live demonstrations, the cultural resistance has been mostly overcome. As a result, implementation of the RFID technology is taking place at several of U.S. Department of Energy sites and laboratories for processing, storage, and transportation applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Li, Xinning, and Zhiping Zhou. "Secure support vector machines with data perturbation." In 2018 Chinese Control And Decision Conference (CCDC). IEEE, 2018. http://dx.doi.org/10.1109/ccdc.2018.8407306.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Panaretou, Ioannis, Stavros Hadjithephanous, Corinne Kassapoglou-Faist, Philippe Dallemange, Sofia Louloudi, Dimitrios Karadimas, Christos Panagiotou, Charalampos Kostopoulos, Konstantinos Michail, and Anastasis Kounoudes. "OffshoreMuster: An Integrated Real Time Localisation, Mustering and Evacuation Management System for Offshore Oil & Gas Health and Safety Operations." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/207661-ms.

Повний текст джерела
Анотація:
Abstract Oil & Gas offshore platforms are industrial "towns", ranked among the most hazardous working environments. Emergency situations in such environments are unpredictable and characterized by time pressure and rapidly changing conditions. OffshoreMuster brings together the latest technological advancements in real-time personnel tracking and e-mustering, complementing the existing Health and Safety (HSE) procedures, by enabling situation awareness over personnel location and status which is a key factor supporting better decision-making towards zero casualty in emergency situations. The system's underlying technology, developed after years of dedicated research and development efforts, consists of specialised low-power wireless wearable devices, customised gateways and a secure backbone network infrastructure feeding a modular decision support software system with real-time streams of data for processing and visualisation of information relevant to personnel situation assessment. HSE processes have been transformed into systematic procedures, allowing additional computer-aided decision support features, like the real-time observation of the fire-fighting team response status, the concentration of people in specific areas, instant alerting or the last-known position of a missing person. Lightweight ubiquitous devices in the form of a bracelet or embedded in the uniform are assigned to People on Board (PoB) and periodically transmit real-time location and status awareness data. A network of dedicated gateways, which are placed at specific locations on the platform or vessel, connected through the infrastructure's ethernet or wireless network, relay the data to a central decision support system. Specialised localisation algorithms and data analytics tools process the data to estimate the personnel positions and PoB status information, interactively visualising in real-time location awareness, incident escalation and alerting, which can significantly reduce response time and speed up a safe evacuation procedure. Computer-aided decision support combined with ultra-low power autonomous IoT technologies systems play a significant role in controlling, managing, and preventing critical incidents in harsh working environments, contributing into minimisation of accidents occurrence in Oil & Gas environments. The presented underling technology has been validated in maritime environments with more than 500 people taking part in real drills (TRL-8). The technology has been tailored to enhance the safety of personnel working in offshore Oil & Gas assets, currently being under laboratory testing and evaluation while a full-scale industrial deployment is scheduled for the autumn of 2021. The OffshoreMuster hardware and software components, integrated into a unified solution tailored for the offshore Oil & Gas industry, are presented for the first time. The system has been designed and developed with the support of the European Commission, co-funded by the Fast Track to Innovation Program (Grant Agreement Number 878950).
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhu, Yan, Di Ma, and Shanbiao Wang. "Secure Data Retrieval of Outsourced Data with Complex Query Support." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.91.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mao, Shufu, and Tilman Wolf. "Hardware Support for Secure Processing in Embedded Systems." In 2007 44th ACM/IEEE Design Automation Conference. IEEE, 2007. http://dx.doi.org/10.1109/dac.2007.375213.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mao, Shufu, and Tilman Wolf. "Hardware support for secure processing in embedded systems." In the 44th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1278480.1278605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Patil, Sangram Damodar, Pradip S. Bhendwade, and R. T. Patil. "Steganographic secure data communication." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949985.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hadole, Pragati, and Vidya Dhamdhere. "Secure decision support system for healthcare professionals." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389517.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Support secure data processing"

1

Washington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, July 1997. http://dx.doi.org/10.21236/ada327808.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Washington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada372857.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Schwan, Karsten. Runtime System for I/O Staging in Support of In-Situ Processing of Extreme Scale Data. Office of Scientific and Technical Information (OSTI), November 2013. http://dx.doi.org/10.2172/1164268.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Dodge, D. Report on a new architecture to support integration and processing of seismic data from heterogeneous sources. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1658693.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/289435.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bigl, Matthew, Caitlin Callaghan, Brandon Booker, Kathryn Trubac, Jacqueline Willan, Paulina Lintsai, and Marissa Torres. Energy Atlas—mapping energy-related data for DoD lands in Alaska : Phase 2—data expansion and portal development. Engineer Research and Development Center (U.S.), January 2022. http://dx.doi.org/10.21079/11681/43062.

Повний текст джерела
Анотація:
As the largest Department of Defense (DoD) land user in Alaska, the U.S. Army oversees over 600,000 hectares of land, including remote areas accessible only by air, water, and winter ice roads. Spatial information related to the energy resources and infrastructure that exist on and adjacent to DoD installations can help inform decision makers when it comes to installation planning. The Energy Atlas−Alaska portal provides a secure value-added resource to support the decision-making process for energy management, investments in installation infrastructure, and improvements to energy resiliency and sustainability. The Energy Atlas–Alaska portal compiles spatial information and provides that information through a secure online portal to access and examine energy and related resource data such as energy resource potential, energy corridors, and environmental information. The information database is hosted on a secure Common Access Card-authenticated portal that is accessible to the DoD and its partners through the Army Geospatial Center’s Enterprise Portal. This Enterprise Portal provides effective visualization and functionality to support analysis and inform DoD decision makers. The Energy Atlas–Alaska portal helps the DoD account for energy in contingency planning, acquisition, and life-cycle requirements and ensures facilities can maintain operations in the face of disruption.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase II: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289436.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase III: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289437.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lasko, Kristofer, and Sean Griffin. Monitoring Ecological Restoration with Imagery Tools (MERIT) : Python-based decision support tools integrated into ArcGIS for satellite and UAS image processing, analysis, and classification. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40262.

Повний текст джерела
Анотація:
Monitoring the impacts of ecosystem restoration strategies requires both short-term and long-term land surface monitoring. The combined use of unmanned aerial systems (UAS) and satellite imagery enable effective landscape and natural resource management. However, processing, analyzing, and creating derivative imagery products can be time consuming, manually intensive, and cost prohibitive. In order to provide fast, accurate, and standardized UAS and satellite imagery processing, we have developed a suite of easy-to-use tools integrated into the graphical user interface (GUI) of ArcMap and ArcGIS Pro as well as open-source solutions using NodeOpenDroneMap. We built the Monitoring Ecological Restoration with Imagery Tools (MERIT) using Python and leveraging third-party libraries and open-source software capabilities typically unavailable within ArcGIS. MERIT will save US Army Corps of Engineers (USACE) districts significant time in data acquisition, processing, and analysis by allowing a user to move from image acquisition and preprocessing to a final output for decision-making with one application. Although we designed MERIT for use in wetlands research, many tools have regional or global relevancy for a variety of environmental monitoring initiatives.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jasper, Paul. How can new technology support better measurement of extreme poverty? Data and Evidence to End Extreme Poverty, July 2021. http://dx.doi.org/10.55158/deepwpr1.

Повний текст джерела
Анотація:
A research insight summarising a longer review exploring how innovation in data collection, data processing, and data analysis, might provide solutions to ‘pinch points’ in policymaking and management around poverty reduction.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії