Добірка наукової літератури з теми "Support secure data processing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Support secure data processing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Support secure data processing"
Sun, Yan, and Shambhu Upadhyaya. "Secure and privacy preserving data processing support for active authentication." Information Systems Frontiers 17, no. 5 (July 29, 2015): 1007–15. http://dx.doi.org/10.1007/s10796-015-9587-9.
Повний текст джерелаJariwala, Vivaksha, Himanshu Patel, Parth Patel, and Devesh C. Jinwala. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." International Journal of Distributed Systems and Technologies 5, no. 3 (July 2014): 77–99. http://dx.doi.org/10.4018/ijdst.2014070104.
Повний текст джерелаWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Повний текст джерелаSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Повний текст джерелаMarwan, Mbarek, Ali Karti, and Hassan Ouahmane. "Proposal for a Secure Data Sharing and Processing in Cloud Applications for Healthcare Domain." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 1 (January 31, 2021): 10–17. http://dx.doi.org/10.52502/ijitas.v3i1.15.
Повний текст джерелаAlenezi, Mamdouh, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan. "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 14–31. http://dx.doi.org/10.4018/ijisp.2019040102.
Повний текст джерелаHamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, and Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms." Entropy 24, no. 4 (April 6, 2022): 519. http://dx.doi.org/10.3390/e24040519.
Повний текст джерелаAlsaig, Alaa, Vangalur Alagar, Zaki Chammaa, and Nematollaah Shiri. "Characterization and Efficient Management of Big Data in IoT-Driven Smart City Development." Sensors 19, no. 11 (May 28, 2019): 2430. http://dx.doi.org/10.3390/s19112430.
Повний текст джерелаMeister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (September 9, 2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.
Повний текст джерелаSánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Повний текст джерелаДисертації з теми "Support secure data processing"
Найда, Андрій Олегович. "Адаптивний механізм управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/35934.
Повний текст джерелаThesis: 66 p.,8 fig., 12 Table., 2 Appendix, 7 j. Object of study - Adaptive security management mechanisms to support secure data processing in distributed computer systems Software product - a simulation program for determining encryption and message processing, programming language - C ++. The purpose of the work is to investigate the methods of implementation of adaptive control systems. Research method - study of literature and other information sources on this topic, analysis of existing methods of adaptive management mechanisms.
Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.
Повний текст джерелаWang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.
Повний текст джерелаBeckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Повний текст джерелаMutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Iwaya, Leonardo H. "Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-46982.
Повний текст джерелаInformation security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance.
Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.
Повний текст джерелаRamachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.
Повний текст джерелаMxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.
Повний текст джерелаKordale, Rammohan. "System support for scalable services." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8246.
Повний текст джерелаКниги з теми "Support secure data processing"
Marsh, David. Project support office: Or, project support assistant. London: Stationery Office, 2001.
Знайти повний текст джерелаAtluri, Vijay. Multilevel secure transaction processing. Boston: Kluwer Academic, 2000.
Знайти повний текст джерелаWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Знайти повний текст джерелаHale, Mark P. Implementing computing support centers. McKinney, Tex: Academic Computing Publications, 1989.
Знайти повний текст джерелаHodge, Gail M. Computer support to indexing. Philadelphia: National Federation of Abstracting and Information Services, 1998.
Знайти повний текст джерелаWallis, Louis A. Computer-based sales force support. New York, NY: Conference Board, 1990.
Знайти повний текст джерелаGuariso, Giorgio. Environmental decision support systems. Chichester [England]: E. Horwood, 1989.
Знайти повний текст джерелаImproving planning support: The use of planning support systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, Faculteit Geowetenschappen Universiteit Utrecht, 2006.
Знайти повний текст джерелаVonk, Guido A. Improving planning support: The use of Planning Support Systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, 2004.
Знайти повний текст джерелаUnited States. Internal Revenue Service. Operations support branch glossaries. [Washington, D.C.?]: Internal Revenue Service, 1987.
Знайти повний текст джерелаЧастини книг з теми "Support secure data processing"
Thuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Adversarial Support Vector Machine Learning." In Secure Data Science, 175–94. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-18.
Повний текст джерелаAdaikkalavan, Raman, Indrakshi Ray, and Xing Xie. "Multilevel Secure Data Stream Processing." In Lecture Notes in Computer Science, 122–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22348-8_11.
Повний текст джерелаMinowa, Tadashi, and Takeshi Takahashi. "Secure Distributed Storage for Bulk Data." In Neural Information Processing, 566–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_67.
Повний текст джерелаThuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Secure Cloud Query Processing Based on Access Control for Big Data Systems." In Secure Data Science, 267–93. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-26.
Повний текст джерелаKokemüller, Jochen, Heiko Roßnagel, and Anette Weisbecker. "Secure Mobile Support of Independent Sales Agencies." In Lecture Notes in Business Information Processing, 169–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03132-8_14.
Повний текст джерелаMann, Zoltán Ádám, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, and Paul Mundt. "Secure Data Processing in the Cloud." In Communications in Computer and Information Science, 149–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79090-9_10.
Повний текст джерелаMine, Tsunenori, Kosaku Kimura, Satoshi Amamiya, Ken’ichi Takahashi, and Makoto Amamiya. "Agent-Community-Network-Based Secure Collaboration Support System." In Lecture Notes in Business Information Processing, 234–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01668-4_13.
Повний текст джерелаSompolinsky, Yonatan, and Aviv Zohar. "Secure High-Rate Transaction Processing in Bitcoin." In Financial Cryptography and Data Security, 507–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_32.
Повний текст джерелаWelzer, Tatjana, Marko Hölbl, Marjan Družovec, Brane Klopčič, Boštjan Brumen, Hannu Jaakkola, and Mirjam Bonačić. "Medical Personal Data in Secure Information Systems." In Lecture Notes in Business Information Processing, 340–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01112-2_35.
Повний текст джерелаChavarría-Miranda, Daniel, John Mellor-Crummey, and Trushar Sarang. "Data-Parallel Compiler Support for Multipartitioning." In Euro-Par 2001 Parallel Processing, 241–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44681-8_36.
Повний текст джерелаТези доповідей конференцій з теми "Support secure data processing"
Concepcion Leon, Adrian, and Markus Endler. "Secure distributed ledgers to support IoT technologies data." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7356.
Повний текст джерелаChen, Hao, Lin Chen, Xiaoyun Kuang, Aidong Xu, and Yiwei Yang. "Support Forward Secure Smart Grid Data Deduplication and Deletion Mechanism." In 2021 2nd Asia Symposium on Signal Processing (ASSP). IEEE, 2021. http://dx.doi.org/10.1109/assp54407.2021.00019.
Повний текст джерелаTsai, Hanchung, Yung Y. Liu, and James Shuler. "RFID Technology for Environmental Remediation and Radioactive Waste Management." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40218.
Повний текст джерелаLi, Xinning, and Zhiping Zhou. "Secure support vector machines with data perturbation." In 2018 Chinese Control And Decision Conference (CCDC). IEEE, 2018. http://dx.doi.org/10.1109/ccdc.2018.8407306.
Повний текст джерелаPanaretou, Ioannis, Stavros Hadjithephanous, Corinne Kassapoglou-Faist, Philippe Dallemange, Sofia Louloudi, Dimitrios Karadimas, Christos Panagiotou, Charalampos Kostopoulos, Konstantinos Michail, and Anastasis Kounoudes. "OffshoreMuster: An Integrated Real Time Localisation, Mustering and Evacuation Management System for Offshore Oil & Gas Health and Safety Operations." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/207661-ms.
Повний текст джерелаZhu, Yan, Di Ma, and Shanbiao Wang. "Secure Data Retrieval of Outsourced Data with Complex Query Support." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.91.
Повний текст джерелаMao, Shufu, and Tilman Wolf. "Hardware Support for Secure Processing in Embedded Systems." In 2007 44th ACM/IEEE Design Automation Conference. IEEE, 2007. http://dx.doi.org/10.1109/dac.2007.375213.
Повний текст джерелаMao, Shufu, and Tilman Wolf. "Hardware support for secure processing in embedded systems." In the 44th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1278480.1278605.
Повний текст джерелаPatil, Sangram Damodar, Pradip S. Bhendwade, and R. T. Patil. "Steganographic secure data communication." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949985.
Повний текст джерелаHadole, Pragati, and Vidya Dhamdhere. "Secure decision support system for healthcare professionals." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389517.
Повний текст джерелаЗвіти організацій з теми "Support secure data processing"
Washington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, July 1997. http://dx.doi.org/10.21236/ada327808.
Повний текст джерелаWashington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada372857.
Повний текст джерелаSchwan, Karsten. Runtime System for I/O Staging in Support of In-Situ Processing of Extreme Scale Data. Office of Scientific and Technical Information (OSTI), November 2013. http://dx.doi.org/10.2172/1164268.
Повний текст джерелаDodge, D. Report on a new architecture to support integration and processing of seismic data from heterogeneous sources. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1658693.
Повний текст джерелаZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/289435.
Повний текст джерелаBigl, Matthew, Caitlin Callaghan, Brandon Booker, Kathryn Trubac, Jacqueline Willan, Paulina Lintsai, and Marissa Torres. Energy Atlas—mapping energy-related data for DoD lands in Alaska : Phase 2—data expansion and portal development. Engineer Research and Development Center (U.S.), January 2022. http://dx.doi.org/10.21079/11681/43062.
Повний текст джерелаZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase II: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289436.
Повний текст джерелаZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase III: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289437.
Повний текст джерелаLasko, Kristofer, and Sean Griffin. Monitoring Ecological Restoration with Imagery Tools (MERIT) : Python-based decision support tools integrated into ArcGIS for satellite and UAS image processing, analysis, and classification. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40262.
Повний текст джерелаJasper, Paul. How can new technology support better measurement of extreme poverty? Data and Evidence to End Extreme Poverty, July 2021. http://dx.doi.org/10.55158/deepwpr1.
Повний текст джерела