Results 231 to 240 of about 25,084,029 (287)
Some of the next articles are maybe not open access.

Differentiating Data Security and Network Security

2008 IEEE International Conference on Communications, 2008
Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "break" the generated cipher code. It has been demonstrated that this inability is temporary because some strong cryptographic methods that were believed to be unbreakable have been broken.
openaire   +2 more sources

Data security and consumer trust in FinTech innovation in Germany

Information and Computer Security, 2018
The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of mobile devices and their usage have increased the uptake of financial technology
H. Stewart, J. Jürjens
semanticscholar   +1 more source

3D Fluorescent Hydrogel Origami for Multistage Data Security Protection

Advanced Functional Materials, 2019
Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang   +5 more
semanticscholar   +1 more source

A Security Architecture for Data Privacy and Security

2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture
openaire   +2 more sources

DATA PROTECTION — SECURITY

Computer Law & Security Report, 2002
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire   +2 more sources

Ensure Hierarchal Identity Based Data Security in Cloud Environment

International Journal of Cloud Applications and Computing, 2019
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled.
S. Kaushik, C. Gandhi
semanticscholar   +1 more source

Data Security and Privacy in Fog Computing

IEEE Network, 2018
Cloud computing is now a popular computing paradigm that can provide end users access to configurable resources on any device, from anywhere, at any time. During the past years, cloud computing has been developed dramatically.
Yunguo Guan   +3 more
semanticscholar   +1 more source

Securing Your Data

2010
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire   +2 more sources

On Securely Manipulating XML Data

2013
Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A small number of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of the update operations of W3C ...
Mahfoud, Houari, Imine, Abdessamad
openaire   +4 more sources

Data Access and Security

2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire   +2 more sources

Home - About - Disclaimer - Privacy