Filters








3,711 Hits in 5.7 sec

Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company

Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih
2010 International Journal of Computer Applications  
Information security is the process by which an organization protects and secures its resources and maintains information vital to its operation.  ...  Information is one of the important assets of an organization. Protection of information assets is necessary to establish and maintain trust between the organizations and its customers.  ...  Log Tracing: A log view is maintained by the system used by the user to access the information.  ... 
doi:10.5120/1599-2148 fatcat:eu75nrepxnabnhsqmn2tupq7zi

The Architecture of an Intelligent Technical Support System for Electricity Spot Market

Shuhao Sun, Huijie Gu, Chaoyi Peng, Huafeng Zhou, Dewen Seng, Ahmed Farouk
2022 Scientific Programming  
modules, provide declaration information and some market evaluation results to the southern regional spot power system platform, and obtain clearance results and published information from this platform  ...  However, as the number and scope of market participants gradually expand, the market-oriented transaction power continues to rise, and the intraprovincial and interprovincial transaction varieties are  ...  of transaction data. (6) e system should have the network attack prevention function in the Internet exportation and protect against network attacks such as DDOS attacks through various means such as  ... 
doi:10.1155/2022/1540263 fatcat:5wxrsub5hfgnpajmtj2zkmt2xa

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

Stefanos Gritzalis, Sokratis K Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou
2000 Computers & security  
enjoys all the desirable characteristics and fulfils all those criteria that are essential for a PKI to constitute a successful framework for the development of inter-domain and international Trusted Services  ...  The proposed PKI architecture guarantees openness, scalability, flexibility, extensibility, integration with existing TTP and information infrastructure, transparency and, above all, security.Thus, it  ...  It states the general means and fashion for storing, archiving and maintaining several types of data ranging from organization's legal requirements, to system recovery needs.  ... 
doi:10.1016/s0167-4048(00)08022-6 fatcat:kbbw75pw5faefhru5lmvqgi6x4

Moderating effect between information systems resources and information security: A conceptual framework

Norizan Anwar, Mohamad Noorman Masrek, Yanty Rahayu Rambli
2011 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA)  
The study by [10] had developed and validated a framework depicting the relationship between Information System Resources and Information Security.  ...  The proposed framework is expected to provide opportunity for researcher to validate it through the conduct of research.  ...  ACKNOWLEDGMENT We greatly appreciate Research Management Institute (RMI), UiTM for giving us the opportunity to study on the relationship between information systems resources and information security.  ... 
doi:10.1109/isbeia.2011.6088815 fatcat:fwowtmqzgnezdlqwq67efe7sri

Monitoring and the Portability of Soft Information

Dennis Campbell, Maria Loumioti
2013 Social Science Research Network  
Using unique data on lending decisions made by employees in a highly decentralized financial services organization, we show that a monitoring system which captures soft information for vertical communication  ...  Theories from a variety of literatures suggest that difficulties in capturing, storing, and communicating soft information can inhibit its portability over time and across individuals within the organization  ...  of data captured in the organization's transaction records and customer databases.  ... 
doi:10.2139/ssrn.2233467 fatcat:xuv7qkjtprgdjdhy2hzhlug3lq

Comprehensive Survey on Big Data Privacy Protection

Mohammed BinJubier, Abdulghani Ali Ahmed, Mohd Arfian Bin Ismail, Ali Safaa Sadiq, Muhammad Khurram Khan
2019 IEEE Access  
of information for the intended data analysis task.  ...  or inaccurate data distribution from several data providers.  ...  In general, agglomerative clustering has time complexity (ϑ n 2 log (n) , whereas divisive clustering demands comprehensive search (ϑ (2 n )).  ... 
doi:10.1109/access.2019.2962368 fatcat:wxkxtknlbngqdf6wm6hxyk4l7e

A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions

Muhammad Usman Ashraf
2021 Lahore Garrison University research journal of computer science and information technology  
, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity.  ...  The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.  ...  , has implemented clear integrity in the log transactions.  ... 
doi:10.54692/lgurjcsit.2021.0503213 fatcat:fqrwk3h425fonazb7664g5swzm

Relational Database Design And Implementation For Biodiversity Informatics

Paul J. Morris
2005 Zenodo  
This paper also discusses typical problems present in legacy data, how they are characteristic of efforts to handle complex information in simple databases, and methods for handling those data during data  ...  The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information  ...  (A transaction log records every update insert and delete made to the database and allows recovery from the last incremental backup to the moment of failure).  ... 
doi:10.5281/zenodo.59796 fatcat:hbtu64eoj5fsbibdgtbtxgrejy

Academy of natural sciences

1877 Journal of the Franklin Institute  
This paper also discusses typical problems present in legacy data, how they are characteristic of efforts to handle complex information in simple databases, and methods for handling those data during data  ...  The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information  ...  (A transaction log records every update insert and delete made to the database and allows recovery from the last incremental backup to the moment of failure).  ... 
doi:10.1016/0016-0032(77)90769-4 fatcat:yq56exkbjnfcveaxdam7togv2u

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
We compare the efficiency of schemes under CPA (chosen plaintext attack) security only as previous schemes utilized different generalized security transformation from CPA to CCA. [6],[7] Fig.2.  ...  From the server's point of view, how to place the data items on channels is a crucial issue, with the objective of minimizing the average access time and tuning time.  ...  Our structure, which we call skip-webs, matches the O(log n/ log log n) expected query time of NoN skip-graphs [13, 14] for onedimensional data, while maintaining the O(log n) memory size and expected  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

The Lustre Storage Architecture [article]

Peter Braam
2019 arXiv   pre-print
This lengthy document often referred to as the "Lustre Book", contains a detailed outline of Lustre file system architecture, as it was created between 2001 and 2005, in accordance with the requirements from  ...  As part of the local update a log record, either in memory or transactionally consistent on disk through nested transactions (as in recovery) is created.  ...  Generally, logs are written transactionally and cancelled when a commit on another system completes. Log records are stored in log objects.  ... 
arXiv:1903.01955v1 fatcat:fuq664grqzcexcovxzd2n7f5ji

Assessing and managing risks to information assurance: A methodological approach

Gregory A. Lamm, Yacov Y. Haimes
2002 Systems Engineering  
International issues effect how we protect, detect, react, and recovery from computer attacks (e.g., the "I Love You" virus).  ...  M.8 Confidentiality Levels The number of informational categorical divisions arranged for the purpose of segregating information away from unauthorized personnel.  ...  length, bits per second for data rate).  ... 
doi:10.1002/sys.10030 fatcat:3cthjejvubexfbzjaht7q77kby

Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain

Abdul Razaque, Fathi Amsaad, Meer Jaro Khan, Salim hariri, Shujing Chen, Siting chen, Xingchen Ji
2019 IEEE Access  
More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature.  ...  Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health.  ...  In the proposed method, features of malware are automatically extracted from the host logs.  ... 
doi:10.1109/access.2019.2950849 fatcat:nk5ipbbbkrcrrecv6ihipnf6nm

Key Technologies of Sovereignty Network [chapter]

Hui Li, Xin Yang
2021 Co-governed Sovereignty Network  
Technologies for guaranteeing privacy, security, and transmission control, etc. were also presented.  ...  Firstly, on application layer, we proposed a large-scale multilateral managed consortium blockchain technology named as Proof of Vote to construct the multi-identifier system (MIS) for all nations in the  ...  For data requested by internal users, its contents and requesters are recorded by blockchain log.  ... 
doi:10.1007/978-981-16-2670-8_4 fatcat:nmwozv3k6vekvcwgschwmdwfza

Microchain: a Light Hierarchical Consensus Protocol for IoT System [article]

Ronghua Xu, Yu Chen
2019 arXiv   pre-print
., in terms of data confidentiality, transaction throughput, and network scalability.  ...  The rapid evolution in blockchain technologies, which relied on a decentralized, immutable and distributed ledger system for transaction data auditing, provides a prospective solution to address the issues  ...  , so that old messages from the log are safely discarded.  ... 
arXiv:1912.10357v1 fatcat:bwo72o5c5jdrxea62gkis7kkum
« Previous Showing results 1 — 15 out of 3,711 results