Results 61 to 70 of about 22,394,325 (191)
Mortality Rates of Elderly Asian American Populations Based on Medicare and Social Security Data [PDF]
Diane S. Lauderdale, Bert Kestenbaum
openalex +2 more sources
A Brief Study of Computer Network Security Technologies [PDF]
The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system.
arxiv
The impact of Big Data analytics and data security practices on service supply chain performance
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando+2 more
semanticscholar +1 more source
An overview of privacy and security requirements for data bases [PDF]
J. Richard Dowell
openalex +1 more source
Security for IEEE P1451.1.6-based Sensor Networks for IoT Applications [PDF]
There are many challenges for Internet of Things (IoT) sensor networks including the lack of robust standards, diverse wireline and wireless connectivity, interoperability, security, and privacy. Addressing these challenges, the Institute of Electrical and Electronics Engineers (IEEE) P1451.0 standard defines network services, transducer services ...
arxiv
Geographical Security Questions for Fallback Authentication [PDF]
Fallback authentication is the backup authentication method used when the primary authentication method (e.g., passwords, fingerprints, etc.) fails. Currently, widely-deployed fallback authentication methods (e.g., security questions, email resets, and SMS resets) suffer from documented security and usability flaws that threaten the security of ...
arxiv
Healthcare Data Security Technology: HIPAA Compliance
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general.
Scholas Mbonihankuye+2 more
semanticscholar +1 more source
Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv