Results 51 to 60 of about 22,394,325 (191)

Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques [PDF]

open access: yes, 2016
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data.
arxiv   +1 more source

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

open access: yesIEEE Access, 2018
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang   +4 more
semanticscholar   +1 more source

Classification of Various Security Techniques in Databases and their Comparative Analysis [PDF]

open access: yesACTA Technica Corviniensis, Vol. 5, Issue 2, April-June 2012, pp. 135-138, 2012
Data security is one of the most crucial and a major challenge in the digital world. Security, privacy and integrity of data are demanded in every operation performed on internet. Whenever security of data is discussed, it is mostly in the context of secure transfer of data over the unreliable communication networks.
arxiv  

Distributed storage for data security [PDF]

open access: yes2014 IEEE Information Theory Workshop (ITW 2014), 2014
5 pages, submitted to ITW ...
Annina Bracher, Amos Lapidoth, Eran Hof
openaire   +3 more sources

Secure contexts for confidential data [PDF]

open access: yes16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2004
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available.
BOSSI A.   +3 more
openaire   +4 more sources

Chaotic iterations versus Spread-spectrum: topological-security and stego-security [PDF]

open access: yesarXiv, 2011
A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure
arxiv  

Ghosts of Deletions Past: New Secure Deletion Challenges and Solutions [PDF]

open access: yesarXiv, 2016
Is secure deletion of data still a problem?
arxiv  

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities

open access: yesIEEE Communications Magazine, 2019
Benefiting from the advancement of algorithms in massive data and powerful computing resources, deep learning has been explored in a wide variety of fields and produced unparalleled performance results.
Guowen Xu   +4 more
semanticscholar   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yesarXiv, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks.
arxiv  

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption [PDF]

open access: yesInternational Journal On Advances in Security, volume 6, number 1&2, pp. 78-87 ISSN 1942-2636, 2013, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user.
arxiv  

Home - About - Disclaimer - Privacy