Results 231 to 240 of about 25,084,029 (287)
Some of the next articles are maybe not open access.
Differentiating Data Security and Network Security
2008 IEEE International Conference on Communications, 2008Data security, since antiquity, relies on cryptography. Cryptography is as good as the inability of a person or a computing machine to "break" the generated cipher code. It has been demonstrated that this inability is temporary because some strong cryptographic methods that were believed to be unbreakable have been broken.
openaire +2 more sources
Data security and consumer trust in FinTech innovation in Germany
Information and Computer Security, 2018The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of mobile devices and their usage have increased the uptake of financial technology
H. Stewart, J. Jürjens
semanticscholar +1 more source
3D Fluorescent Hydrogel Origami for Multistage Data Security Protection
Advanced Functional Materials, 2019Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang+5 more
semanticscholar +1 more source
A Security Architecture for Data Privacy and Security
2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture
openaire +2 more sources
Computer Law & Security Report, 2002
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire +2 more sources
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire +2 more sources
Ensure Hierarchal Identity Based Data Security in Cloud Environment
International Journal of Cloud Applications and Computing, 2019Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled.
S. Kaushik, C. Gandhi
semanticscholar +1 more source
Data Security and Privacy in Fog Computing
IEEE Network, 2018Cloud computing is now a popular computing paradigm that can provide end users access to configurable resources on any device, from anywhere, at any time. During the past years, cloud computing has been developed dramatically.
Yunguo Guan+3 more
semanticscholar +1 more source
2010
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire +2 more sources
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire +2 more sources
On Securely Manipulating XML Data
2013Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A small number of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of the update operations of W3C ...
Mahfoud, Houari, Imine, Abdessamad
openaire +4 more sources
2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +2 more sources
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +2 more sources