Results 251 to 260 of about 466,376 (302)
Lightweight Protocol for Data Integrity and Security Verification in Drone Swarm Networks
So-Yeon Min, Jae‐Seung Lee
openalex +1 more source
Data-driven control of network systems: Accounting for communication adaptivity and security
Wang, Gang +5 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Data-centric security: Integrating data privacy and data security
IBM Journal of Research and Development, 2009Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
S. D. Hennessy +4 more
openaire +1 more source
Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
HealthTexas, 1990
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire +3 more sources
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire +3 more sources

