Results 11 to 20 of about 2,828,600 (279)
Strict adherence to data integrity and quality standards is crucial for the pharmaceutical industry to minimize undesired effects and ensure that medicines are of the required quality and safe for patients.
Isaak Kavasidis +6 more
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
Computational science simulations produce huge volumes of data for scientific research organizations. Often, this data is shared by data centers distributed geographically for storage and analysis.
Preethika Kasu +2 more
doaj +1 more source
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools.
Preethika Kasu +2 more
doaj +1 more source
A Survey of Blockchain for Video Integrity
Blockchain has become an important alternative in plenty of industries due to its features such as traceability, transparency and data integrity. Blockchain is not only present in the management of structured data-like names, timestamps, addresses and so
Jorge Ceron +2 more
doaj +1 more source
A revival of integrity constraints for data cleaning [PDF]
Integrity constraints, a.k.a . data dependencies, are being widely used for improving the quality of schema .
Fan, Wenfei, Geerts, Floris, Jia, Xibei
core +1 more source
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag ...
Georgios M. Nikolopoulos, Marc Fischlin
doaj +1 more source
Monitoring Data Integrity in Big Data Analytics Services [PDF]
Enabled by advances in Cloud technologies, Big Data Analytics Services (BDAS) can improve many processes and identify extra information from previously untapped data sources. As our experience with BDAS and its benefits grows and technology for obtaining
Kloukinas, C. +2 more
core +1 more source
Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach
Incorporation of connected vehicle (CV) data into real-time traffic management systems presents a host of new challenges resulting from the current lack of data integrity and data privacy in traffic networks.
Wanxin Li +3 more
doaj +1 more source

