Academic literature on the topic 'Data processing security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data processing security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data processing security"
Littlejohns, C. S. "Word processing and data security." BMJ 298, no. 6677 (April 1, 1989): 893. http://dx.doi.org/10.1136/bmj.298.6677.893-b.
Full textEditorial. "Information Security and Multisensor Data Processing." Information & Security: An International Journal 2 (1999): 5–11. http://dx.doi.org/10.11610/isij.0200.
Full textJacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (March 1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.
Full textLahno, Valery. "ENSURING OF INFORMATION PROCESSES’ RELIABILITY AND SECURITY IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS." MEST Journal 2, no. 1 (January 15, 2014): 71–79. http://dx.doi.org/10.12709/mest.02.02.01.07.
Full textInieke, Otobong. "Data Security." International Journal of Digital Literacy and Digital Competence 10, no. 4 (October 2019): 25–39. http://dx.doi.org/10.4018/ijdldc.2019100102.
Full textBrown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Full textLi, Jun, and Yanzhao Liu. "An Efficient Data Analysis Framework for Online Security Processing." Journal of Computer Networks and Communications 2021 (April 1, 2021): 1–12. http://dx.doi.org/10.1155/2021/9290853.
Full textKumar, Narander, Vishal Verma, and Vipin Saxena. "A Security Algorithm for Online Analytical Processing Data Cube." International Journal of Computer Applications 79, no. 14 (October 18, 2013): 7–10. http://dx.doi.org/10.5120/13807-1768.
Full textKozin, I. S. "Blockchain-based technology for security processing of personal data." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 5 (October 1, 2019): 892–900. http://dx.doi.org/10.17586/2226-1494-2019-19-5-892-900.
Full textRohrlach, H. J. "Protection of privacy and security measures in data-processing." International Social Security Review 39, no. 1 (January 1986): 14–23. http://dx.doi.org/10.1111/j.1468-246x.1986.tb00603.x.
Full textDissertations / Theses on the topic "Data processing security"
鄧偉明 and Wai-ming Tang. "Semantics of authentication in workflow security." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B30110828.
Full textKalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Full textBenson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.
Full textKalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Full textAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
He, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.
Full textpublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Hu, Ji, Dirk Cordel, and Christoph Meinel. "A virtual machine architecture for creating IT-security laboratories." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2009/3307/.
Full textKwok, Tai-on Tyrone. "High performance embedded reconfigurable computing data security and media processing applications /." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3204043X.
Full textKwok, Tai-on Tyrone, and 郭泰安. "High performance embedded reconfigurable computing: data security and media processing applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3204043X.
Full text梁松柏 and Chung-pak Leung. "Concurrent auditing on computerized accounting systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269011.
Full textXu, Cheng. "Authenticated query processing in the cloud." HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/620.
Full textBooks on the topic "Data processing security"
Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.
Find full textAtluri, Vijay, and Pierangela Samarati, eds. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.
Full textBhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.
Full textInternational Conference on Data Processing in the Field of Social Security (6th 1991 Helsinki, Finland). Data processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security. Geneva: International Social Security Association, 1992.
Find full textInternational Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Physical security. New York, NY: PricewaterhouseCoopers, 2003.
Find full textBook chapters on the topic "Data processing security"
Weik, Martin H. "data processing system security." In Computer Science and Communications Dictionary, 354. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4345.
Full textFreitas, Pedro Miguel, Teresa Coelho Moreira, and Francisco Andrade. "Data Protection and Biometric Data: European Union Legislation." In Signal Processing for Security Technologies, 413–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47301-7_16.
Full textEllis, Mark. "Data Acquisition and Processing Systems." In Active Interrogation in Nuclear Security, 197–248. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74467-4_7.
Full textReddy, Mallamma V., and Manjunath Sajjan. "Phoneme and Phone Pre-processing Using CLIR Techniques." In Data Science and Security, 299–304. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5309-7_32.
Full textAlmashaqbeh, Ghada, Allison Bishop, and Justin Cappos. "MicroCash: Practical Concurrent Processing of Micropayments." In Financial Cryptography and Data Security, 227–44. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_13.
Full textPhan, Trong Nhan, and Tran Khanh Dang. "An Efficient Batch Similarity Processing with MapReduce." In Future Data and Security Engineering, 158–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_12.
Full textSompolinsky, Yonatan, and Aviv Zohar. "Secure High-Rate Transaction Processing in Bitcoin." In Financial Cryptography and Data Security, 507–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_32.
Full textDo, Hoang Giang, and Wee Keong Ng. "Private Boolean Query Processing on Encrypted Data." In Information and Communications Security, 321–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50011-9_25.
Full textDumas, Marlon, Luciano García-Bañuelos, and Peeter Laud. "Differential Privacy Analysis of Data Processing Workflows." In Graphical Models for Security, 62–79. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46263-9_4.
Full textHeni, Houyem, and Faiez Gargouri. "A Methodological Approach for Big Data Security: Application for NoSQL Data Stores." In Neural Information Processing, 685–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26561-2_80.
Full textConference papers on the topic "Data processing security"
Casey, Jason T., Stephen R. Lach, and John P. Kerekes. "Processing misregistered hyperspectral data." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2007. http://dx.doi.org/10.1117/12.720123.
Full textSingh, Kehar, G. Unnikrishnan, and Naveen K. Nishchal. "Photorefractive optical processing for data security." In International Symposium on Optical Science and Technology, edited by Francis T. S. Yu and Ruyan Guo. SPIE, 2002. http://dx.doi.org/10.1117/12.452711.
Full textNieves, Ruben D. "LIDAR data processing for scalable compression." In SPIE Defense, Security, and Sensing, edited by Monte D. Turner and Gary W. Kamerman. SPIE, 2013. http://dx.doi.org/10.1117/12.2029451.
Full textBartosz, Elizabeth E., Keith DeJong, Herbert A. Duvoisin, Geoff Z. Solomon, William J. Steinway, and Albert Warren. "Nonlinear processing of radar data for landmine detection." In Defense and Security, edited by Russell S. Harmon, J. Thomas Broach, and John H. Holloway, Jr. SPIE, 2004. http://dx.doi.org/10.1117/12.544312.
Full textRadzevicius, Stanley J., Brian T. Clark, and Timothy T. Webster. "Processing ground penetrating radar data from curvilinear interfaces." In Defense and Security, edited by Robert N. Trebits and James L. Kurtz. SPIE, 2005. http://dx.doi.org/10.1117/12.603796.
Full textXie, Wei, Feng Chu, Lipo Wang, and Eng Thiam Lim. "A fuzzy neural network for intelligent data processing." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2005. http://dx.doi.org/10.1117/12.603175.
Full textJohnson, Elliot R., Marc C. Alban, Richard D. Garcia, and Kristopher C. Kozak. "Augmenting autonomous vehicle sensor processing with prior data." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Hoa G. Nguyen. SPIE, 2017. http://dx.doi.org/10.1117/12.2266706.
Full textShlyuger, Gregory. "Apply analytical grid processing to sensor data collections." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2017. http://dx.doi.org/10.1117/12.2269513.
Full textRunnels, Denise R., Chad M. Leflore, and Joseph J. Dirbas. "Hyperspectral data processing algorithm comparison software (HyperPACS)." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2007. http://dx.doi.org/10.1117/12.718134.
Full textWang, Tong, Da-Xin Liu, Wei Sun, and Xuanzuo Lin. "Processing heterogeneous XML data from multi-source." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2006. http://dx.doi.org/10.1117/12.666467.
Full textReports on the topic "Data processing security"
Johnston, B. L. Addendum, automatic data processing (ADP) security plan, Revision 1. ADP facility number: PNL-63. Office of Scientific and Technical Information (OSTI), June 1989. http://dx.doi.org/10.2172/10118490.
Full textPALMER, M. E. Waste Receiving & Processing (WRAP) Facility Test Report For Data Management System (DMS) Security Test DMS-F81. Office of Scientific and Technical Information (OSTI), May 2001. http://dx.doi.org/10.2172/807106.
Full textPALMER, M. E. Waste Receiving and Processing (WRAP) Facility PMS Test Report For Data Management System (DMS) Security Test DMS-Y2K. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/798056.
Full textMurdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/20200057.
Full textTemple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, James I. Rineer, Daniel Lapidus, Kemen Austin, Katherine P. Woodward, and Robert H. Beach III. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, August 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.
Full textFederal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.
Full text