Results 11 to 20 of about 2,828,600 (279)

Deep Transformers for Computing and Predicting ALCOA+Data Integrity Compliance in the Pharmaceutical Industry

open access: yesApplied Sciences, 2023
Strict adherence to data integrity and quality standards is crucial for the pharmaceutical industry to minimize undesired effects and ensure that medicines are of the required quality and safe for patients.
Isaak Kavasidis   +6 more
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

TPBF: Two-Phase Bloom-Filter-Based End-to-End Data Integrity Verification Framework for Object-Based Big Data Transfer Systems

open access: yesMathematics, 2022
Computational science simulations produce huge volumes of data for scientific research organizations. Often, this data is shared by data centers distributed geographically for storage and analysis.
Preethika Kasu   +2 more
doaj   +1 more source

Secure agent data integrity shield [PDF]

open access: yes, 2004
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius   +15 more
core   +1 more source

CRBF: Cross-Referencing Bloom-Filter-Based Data Integrity Verification Framework for Object-Based Big Data Transfer Systems

open access: yesApplied Sciences, 2023
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools.
Preethika Kasu   +2 more
doaj   +1 more source

A Survey of Blockchain for Video Integrity

open access: yesEngineering Proceedings, 2023
Blockchain has become an important alternative in plenty of industries due to its features such as traceability, transparency and data integrity. Blockchain is not only present in the management of structured data-like names, timestamps, addresses and so
Jorge Ceron   +2 more
doaj   +1 more source

A revival of integrity constraints for data cleaning [PDF]

open access: yes, 2008
Integrity constraints, a.k.a . data dependencies, are being widely used for improving the quality of schema .
Fan, Wenfei, Geerts, Floris, Jia, Xibei
core   +1 more source

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources

open access: yesCryptography, 2020
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag ...
Georgios M. Nikolopoulos, Marc Fischlin
doaj   +1 more source

Monitoring Data Integrity in Big Data Analytics Services [PDF]

open access: yes, 2018
Enabled by advances in Cloud technologies, Big Data Analytics Services (BDAS) can improve many processes and identify extra information from previously untapped data sources. As our experience with BDAS and its benefits grows and technology for obtaining
Kloukinas, C.   +2 more
core   +1 more source

Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach

open access: yesIEEE Access, 2020
Incorporation of connected vehicle (CV) data into real-time traffic management systems presents a host of new challenges resulting from the current lack of data integrity and data privacy in traffic networks.
Wanxin Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy