Results 31 to 40 of about 22,394,325 (191)
Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv
Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks
This research paper examines the potential of artificial intelligence (AI) in strengthening data security and mitigating the growing threat of cyber-attacks.
Yijie Weng, Jianhao Wu
semanticscholar +1 more source
Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks [PDF]
In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots. The majority of previous studies focus on only securing the data without considering the security of the pilots used for channel estimation.
arxiv
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire +4 more sources
Data security has become a significant concern in recent times, with the increasing amount of sensitive data being stored and transferred through digital channels. This paper explores the various aspects of data security, including the threats, vulnerabilities, and countermeasures.
openaire +2 more sources
A New Advanced User Authentication and Confidentiality Security Service [PDF]
Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional ...
arxiv +1 more source
Secure Data Processing in the Cloud [PDF]
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám+7 more
openaire +3 more sources
A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as ...
Yichen Hou+5 more
semanticscholar +1 more source
Data security and privacy in the cloud [PDF]
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati+3 more
openaire +1 more source
Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network
A vehicular ad-hoc network (VANET) can improve the flow of traffic to facilitate intelligent transportation and to provide convenient information services, where the goal is to provide self-organizing data transmission capabilities for vehicles on the ...
Xiaohong Zhang, Xiaofeng Chen
semanticscholar +1 more source