A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company
2010
International Journal of Computer Applications
Information security is the process by which an organization protects and secures its resources and maintains information vital to its operation. ...
Information is one of the important assets of an organization. Protection of information assets is necessary to establish and maintain trust between the organizations and its customers. ...
Log Tracing: A log view is maintained by the system used by the user to access the information. ...
doi:10.5120/1599-2148
fatcat:eu75nrepxnabnhsqmn2tupq7zi
The Architecture of an Intelligent Technical Support System for Electricity Spot Market
2022
Scientific Programming
modules, provide declaration information and some market evaluation results to the southern regional spot power system platform, and obtain clearance results and published information from this platform ...
However, as the number and scope of market participants gradually expand, the market-oriented transaction power continues to rise, and the intraprovincial and interprovincial transaction varieties are ...
of transaction data. (6) e system should have the network attack prevention function in the Internet exportation and protect against network attacks such as DDOS attacks through various means such as ...
doi:10.1155/2022/1540263
fatcat:5wxrsub5hfgnpajmtj2zkmt2xa
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
2000
Computers & security
enjoys all the desirable characteristics and fulfils all those criteria that are essential for a PKI to constitute a successful framework for the development of inter-domain and international Trusted Services ...
The proposed PKI architecture guarantees openness, scalability, flexibility, extensibility, integration with existing TTP and information infrastructure, transparency and, above all, security.Thus, it ...
It states the general means and fashion for storing, archiving and maintaining several types of data ranging from organization's legal requirements, to system recovery needs. ...
doi:10.1016/s0167-4048(00)08022-6
fatcat:kbbw75pw5faefhru5lmvqgi6x4
Moderating effect between information systems resources and information security: A conceptual framework
2011
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA)
The study by [10] had developed and validated a framework depicting the relationship between Information System Resources and Information Security. ...
The proposed framework is expected to provide opportunity for researcher to validate it through the conduct of research. ...
ACKNOWLEDGMENT We greatly appreciate Research Management Institute (RMI), UiTM for giving us the opportunity to study on the relationship between information systems resources and information security. ...
doi:10.1109/isbeia.2011.6088815
fatcat:fwowtmqzgnezdlqwq67efe7sri
Monitoring and the Portability of Soft Information
2013
Social Science Research Network
Using unique data on lending decisions made by employees in a highly decentralized financial services organization, we show that a monitoring system which captures soft information for vertical communication ...
Theories from a variety of literatures suggest that difficulties in capturing, storing, and communicating soft information can inhibit its portability over time and across individuals within the organization ...
of data captured in the organization's transaction records and customer databases. ...
doi:10.2139/ssrn.2233467
fatcat:xuv7qkjtprgdjdhy2hzhlug3lq
Comprehensive Survey on Big Data Privacy Protection
2019
IEEE Access
of information for the intended data analysis task. ...
or inaccurate data distribution from several data providers. ...
In general, agglomerative clustering has time complexity (ϑ n 2 log (n) , whereas divisive clustering demands comprehensive search (ϑ (2 n )). ...
doi:10.1109/access.2019.2962368
fatcat:wxkxtknlbngqdf6wm6hxyk4l7e
A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions
2021
Lahore Garrison University research journal of computer science and information technology
, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. ...
The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work. ...
, has implemented clear integrity in the log transactions. ...
doi:10.54692/lgurjcsit.2021.0503213
fatcat:fqrwk3h425fonazb7664g5swzm
Relational Database Design And Implementation For Biodiversity Informatics
2005
Zenodo
This paper also discusses typical problems present in legacy data, how they are characteristic of efforts to handle complex information in simple databases, and methods for handling those data during data ...
The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information ...
(A transaction log records every update insert and delete made to the database and allows recovery from the last incremental backup to the moment of failure). ...
doi:10.5281/zenodo.59796
fatcat:hbtu64eoj5fsbibdgtbtxgrejy
Academy of natural sciences
1877
Journal of the Franklin Institute
This paper also discusses typical problems present in legacy data, how they are characteristic of efforts to handle complex information in simple databases, and methods for handling those data during data ...
The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information ...
(A transaction log records every update insert and delete made to the database and allows recovery from the last incremental backup to the moment of failure). ...
doi:10.1016/0016-0032(77)90769-4
fatcat:yq56exkbjnfcveaxdam7togv2u
Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments
2015
International Journal of Computer Applications Technology and Research
We compare the efficiency of schemes under CPA (chosen plaintext attack) security only as previous schemes utilized different generalized security transformation from CPA to CCA. [6],[7] Fig.2. ...
From the server's point of view, how to place the data items on channels is a crucial issue, with the objective of minimizing the average access time and tuning time. ...
Our structure, which we call skip-webs, matches the O(log n/ log log n) expected query time of NoN skip-graphs [13, 14] for onedimensional data, while maintaining the O(log n) memory size and expected ...
doi:10.7753/ijcatr0405.1001
fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4
The Lustre Storage Architecture
[article]
2019
arXiv
pre-print
This lengthy document often referred to as the "Lustre Book", contains a detailed outline of Lustre file system architecture, as it was created between 2001 and 2005, in accordance with the requirements from ...
As part of the local update a log record, either in memory or transactionally consistent on disk through nested transactions (as in recovery) is created. ...
Generally, logs are written transactionally and cancelled when a commit on another system completes. Log records are stored in log objects. ...
arXiv:1903.01955v1
fatcat:fuq664grqzcexcovxzd2n7f5ji
Assessing and managing risks to information assurance: A methodological approach
2002
Systems Engineering
International issues effect how we protect, detect, react, and recovery from computer attacks (e.g., the "I Love You" virus). ...
M.8 Confidentiality Levels The number of informational categorical divisions arranged for the purpose of segregating information away from unauthorized personnel. ...
length, bits per second for data rate). ...
doi:10.1002/sys.10030
fatcat:3cthjejvubexfbzjaht7q77kby
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
2019
IEEE Access
More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. ...
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. ...
In the proposed method, features of malware are automatically extracted from the host logs. ...
doi:10.1109/access.2019.2950849
fatcat:nk5ipbbbkrcrrecv6ihipnf6nm
Key Technologies of Sovereignty Network
[chapter]
2021
Co-governed Sovereignty Network
Technologies for guaranteeing privacy, security, and transmission control, etc. were also presented. ...
Firstly, on application layer, we proposed a large-scale multilateral managed consortium blockchain technology named as Proof of Vote to construct the multi-identifier system (MIS) for all nations in the ...
For data requested by internal users, its contents and requesters are recorded by blockchain log. ...
doi:10.1007/978-981-16-2670-8_4
fatcat:nmwozv3k6vekvcwgschwmdwfza
Microchain: a Light Hierarchical Consensus Protocol for IoT System
[article]
2019
arXiv
pre-print
., in terms of data confidentiality, transaction throughput, and network scalability. ...
The rapid evolution in blockchain technologies, which relied on a decentralized, immutable and distributed ledger system for transaction data auditing, provides a prospective solution to address the issues ...
, so that old messages from the log are safely discarded. ...
arXiv:1912.10357v1
fatcat:bwo72o5c5jdrxea62gkis7kkum
« Previous
Showing results 1 — 15 out of 3,711 results