Results 321 to 330 of about 26,049,904 (376)
Some of the next articles are maybe not open access.

Data Access and Security

2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire   +1 more source

Data security

2022
Samiksha Shukla   +3 more
  +5 more sources

Securing Data with Workgroup Security

2004
Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire   +1 more source

3D Fluorescent Hydrogel Origami for Multistage Data Security Protection

Advanced Functional Materials, 2019
Current fluorescence‐based anti‐counterfeiting strategies primarily encode information onto single 2D planes and underutilize the possibility of encrypting data inside 3D structures to achieve multistage data security.
Yuchong Zhang   +5 more
semanticscholar   +1 more source

Data security

Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire   +1 more source

Data security.

HealthTexas, 1990
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire   +3 more sources

A survey on cryptographic techniques for protecting big data security: present and forthcoming

Science China Information Sciences, 2022
Siqi Lu   +4 more
semanticscholar   +1 more source

Data security

Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002
Elisa Bertino, FERRARI, ELENA
openaire   +2 more sources

Data Security

IEEE Transactions on Consumer Electronics, 1981
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire   +1 more source

Data and applications security

Data & Knowledge Engineering, 2002
Thuraisingham, Bhavani   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy