Academic literature on the topic 'Data processing security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data processing security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data processing security"

1

Littlejohns, C. S. "Word processing and data security." BMJ 298, no. 6677 (April 1, 1989): 893. http://dx.doi.org/10.1136/bmj.298.6677.893-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Editorial. "Information Security and Multisensor Data Processing." Information & Security: An International Journal 2 (1999): 5–11. http://dx.doi.org/10.11610/isij.0200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (March 1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lahno, Valery. "ENSURING OF INFORMATION PROCESSES’ RELIABILITY AND SECURITY IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS." MEST Journal 2, no. 1 (January 15, 2014): 71–79. http://dx.doi.org/10.12709/mest.02.02.01.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inieke, Otobong. "Data Security." International Journal of Digital Literacy and Digital Competence 10, no. 4 (October 2019): 25–39. http://dx.doi.org/10.4018/ijdldc.2019100102.

Full text
Abstract:
Data security in the information age is a critical facet in the integrity and reliability of the various information systems making up value structures of businesses, organizations etc. Aside from professionals directly involved with securing data within these systems, the importance of data security is not readily apparent to the everyday user of devices in the information systems. The purpose of this literature review is to highlight challenges related to data security and business information systems in conjunction with digital literacy. An extensive literature review was conducted with the aim of identifying and describing scenarios of technology misuse as well as vulnerabilities in vital business information systems. A gap in awareness continues to plague those who leverage information systems for its myriad uses because everyday users will in most cases dismiss data security advice as alarmist or jargon-laden. This falls in line with a 2018 cyber security survey from Statista which showed that 22% of data security tasks was preventing malware while 17% of tasks were dedicated to preventing social engineering and phishing attacks. This literature review will describe possible data insecurity solutions as well as potential areas of further research. The paper will point out the importance of digital literacy as well as recommendations for its improvement in society and also ongoing research in that regard. The essence of this literature review is to identify certain everyday information systems such as decision support systems and transaction processing systems; while pointing out vulnerabilities and threat nature i.e. technical or non-technical and also demonstrating the importance of digital literacy and lack thereof.
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Full text
Abstract:
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jun, and Yanzhao Liu. "An Efficient Data Analysis Framework for Online Security Processing." Journal of Computer Networks and Communications 2021 (April 1, 2021): 1–12. http://dx.doi.org/10.1155/2021/9290853.

Full text
Abstract:
Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. None of them consider the problem that multidimension online temp data analysis in the cloud may appear as continuous and rapid streams, and the scalable analysis rules are continuous online rules generated by deep learning models. To address this problem, in this paper we propose a new LCN-Index data security analysis framework for large scalable rules in the industrial cloud. LCN-Index uses the MapReduce computing paradigm to deploy large scale online data analysis rules: in the mapping stage, it divides each attribute into a batch of analysis predicate sets which are then deployed onto a mapping node using interval predicate index. In the reducing stage, it merges results from the mapping nodes using multiattribute hash index. By doing so, a stream tuple can be efficiently evaluated by going over the LCN-Index framework. Experiments demonstrate the utility of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Narander, Vishal Verma, and Vipin Saxena. "A Security Algorithm for Online Analytical Processing Data Cube." International Journal of Computer Applications 79, no. 14 (October 18, 2013): 7–10. http://dx.doi.org/10.5120/13807-1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kozin, I. S. "Blockchain-based technology for security processing of personal data." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 5 (October 1, 2019): 892–900. http://dx.doi.org/10.17586/2226-1494-2019-19-5-892-900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rohrlach, H. J. "Protection of privacy and security measures in data-processing." International Social Security Review 39, no. 1 (January 1986): 14–23. http://dx.doi.org/10.1111/j.1468-246x.1986.tb00603.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data processing security"

1

鄧偉明 and Wai-ming Tang. "Semantics of authentication in workflow security." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B30110828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.

Full text
Abstract:
Telemetry data has great value, as setting up a framework to collect and gather it involve significant costs. Further, the data itself has product diagnostic significance and may also have strategic national security importance if the product is defense or intelligence related. This potentially makes telemetry data a target for acquisition by hostile third parties. To mitigate this threat, data security principles should be employed by the organization to protect telemetry data. Data security is in an important element of a layered security strategy for the enterprise. The value proposition centers on the argument that if organization perimeter/internal defenses (e.g. firewall, IDS, etc.) fail enabling hostile entities to be able to access data found on internal company networks; they will be unable to read the data because it will be encrypted. After reviewing important encryption background including accepted practices, standards, and architectural considerations regarding disk, file, database and application data protection encryption strategies; specific data security options applicable to telemetry post processing environments will be discussed providing tangible approaches to better protect organization telemetry data.
APA, Harvard, Vancouver, ISO, and other styles
3

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
APA, Harvard, Vancouver, ISO, and other styles
5

He, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.

Full text
Abstract:
Encryption helps to ensure that information within a session is not compromised. Authentication and access control measures ensure legitimate and appropriate access to information, and prevent inappropriate access to such resources. While encryption, authentication and access control each has its own responsibility in securing a communication session, a combination of these three mechanisms can provide much better protection for information. This thesis addresses encryption, authentication and access control related problems in cloud and distributed environments, since these problems are very common in modern organization environment. The first one is a User-friendly Location-free Encryption System for Mobile Users (UFLE). It is an encryption and authentication system which provides maximum security to sensitive data in distributed environment: corporate, home and outdoors scenarios, but requires minimum user effort (i.e. no biometric entry, or possession of cryptographic tokens) to access the data. It makes users securely and easily access data any time and any place, as well as avoids data breach due to stolen/lost laptops and USB flash. The multi-factor authentication protocol provided in this scheme is also applicable to cloud storage. The second one is a Simple Privacy-Preserving Identity-Management for Cloud Environment (SPICE). It is the first digital identity management system that can satisfy “unlinkability”and “delegatable authentication” in addition to other desirable properties in cloud environment. Unlinkability ensures that none of the cloud service providers (CSPs), even if they collude, can link the transactions of the same user. On the other hand, delegatable authentication is unique to the cloud platform, in which several CSPs may join together to provide a packaged service, with one of them being the source provider which interacts with the clients and performs authentication, while the others are receiving CSPs which will be transparent to the clients. The authentication should be delegatable such that the receiving CSP can authenticate a user without a direct communication with either the user or the registrar, and without fully trusting the source CSP. The third one addresses re-encryption based access control issue in cloud and distributed storage. We propose the first non-transferable proxy re-encryption scheme [16] which successfully achieves the non-transferable property. Proxy re-encryption allows a third-party (the proxy) to re-encrypt a ciphertext which has been encrypted for one party without seeing the underlying plaintext so that it can be decrypted by another. A proxy re-encryption scheme is said to be non-transferable if the proxy and a set of colluding delegatees cannot re-delegate decryption rights to other parties. The scheme can be utilized for a content owner to delegate content decryption rights to users in the untrusted cloud storage. The advantages of using such scheme are: decryption keys are managed by the content owner, and plaintext is always hidden from cloud provider.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Ji, Dirk Cordel, and Christoph Meinel. "A virtual machine architecture for creating IT-security laboratories." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2009/3307/.

Full text
Abstract:
E-learning is a flexible and personalized alternative to traditional education. Nonetheless, existing e-learning systems for IT security education have difficulties in delivering hands-on experience because of the lack of proximity. Laboratory environments and practical exercises are indispensable instruction tools to IT security education, but security education in con-ventional computer laboratories poses the problem of immobility as well as high creation and maintenance costs. Hence, there is a need to effectively transform security laboratories and practical exercises into e-learning forms. This report introduces the Tele-Lab IT-Security architecture that allows students not only to learn IT security principles, but also to gain hands-on security experience by exercises in an online laboratory environment. In this architecture, virtual machines are used to provide safe user work environments instead of real computers. Thus, traditional laboratory environments can be cloned onto the Internet by software, which increases accessibilities to laboratory resources and greatly reduces investment and maintenance costs. Under the Tele-Lab IT-Security framework, a set of technical solutions is also proposed to provide eective functionalities, reliability, security, and performance. The virtual machines with appropriate resource allocation, software installation, and system congurations are used to build lightweight security laboratories on a hosting computer. Reliability and availability of laboratory platforms are covered by the virtual machine management framework. This management framework provides necessary monitoring and administration services to detect and recover critical failures of virtual machines at run time. Considering the risk that virtual machines can be misused for compromising production networks, we present security management solutions to prevent misuse of laboratory resources by security isolation at the system and network levels. This work is an attempt to bridge the gap between e-learning/tele-teaching and practical IT security education. It is not to substitute conventional teaching in laboratories but to add practical features to e-learning. This report demonstrates the possibility to implement hands-on security laboratories on the Internet reliably, securely, and economically.
APA, Harvard, Vancouver, ISO, and other styles
7

Kwok, Tai-on Tyrone. "High performance embedded reconfigurable computing data security and media processing applications /." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3204043X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kwok, Tai-on Tyrone, and 郭泰安. "High performance embedded reconfigurable computing: data security and media processing applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3204043X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

梁松柏 and Chung-pak Leung. "Concurrent auditing on computerized accounting systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Cheng. "Authenticated query processing in the cloud." HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/620.

Full text
Abstract:
With recent advances in data-as-a-service (DaaS) and cloud computing, outsourcing data to the cloud has become a common practice. In a typical scenario, the data owner (DO) outsources the data and delegates the query processing service to a service provider (SP). However, as the SP is often an untrusted third party, the integrity of the query results cannot be guaranteed and is thus imperative to be authenticated. To tackle this issue, a typical approach is letting the SP provide a cryptographic proof, which can be used to verify the soundness and completeness of the query results by the clients. Despite extensive research on authenticated query processing for outsourced databases, existing techniques have only considered limited query types. They fail to address a variety of needs demanded by enterprise customers such as supporting aggregate queries over set-valued data, enforcing fine-grained access control, and using distributed computing paradigms. In this dissertation, we take the first step to comprehensively investigate the authenticated query processing in the cloud that fulfills the aforementioned requirements. Security analysis and performance evaluation show that the proposed solutions and techniques are robust and efficient under a wide range of system settings.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data processing security"

1

Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Atluri, Vijay, and Pierangela Samarati, eds. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elbra, R. A. Computer security handbook. Manchester: NCC Blackwell, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

DCE security programming. Sebastopol, CA: O'Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Conference on Data Processing in the Field of Social Security (6th 1991 Helsinki, Finland). Data processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security. Geneva: International Social Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Physical security. New York, NY: PricewaterhouseCoopers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data processing security"

1

Weik, Martin H. "data processing system security." In Computer Science and Communications Dictionary, 354. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Freitas, Pedro Miguel, Teresa Coelho Moreira, and Francisco Andrade. "Data Protection and Biometric Data: European Union Legislation." In Signal Processing for Security Technologies, 413–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47301-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ellis, Mark. "Data Acquisition and Processing Systems." In Active Interrogation in Nuclear Security, 197–248. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74467-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reddy, Mallamma V., and Manjunath Sajjan. "Phoneme and Phone Pre-processing Using CLIR Techniques." In Data Science and Security, 299–304. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5309-7_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Almashaqbeh, Ghada, Allison Bishop, and Justin Cappos. "MicroCash: Practical Concurrent Processing of Micropayments." In Financial Cryptography and Data Security, 227–44. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Phan, Trong Nhan, and Tran Khanh Dang. "An Efficient Batch Similarity Processing with MapReduce." In Future Data and Security Engineering, 158–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sompolinsky, Yonatan, and Aviv Zohar. "Secure High-Rate Transaction Processing in Bitcoin." In Financial Cryptography and Data Security, 507–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Do, Hoang Giang, and Wee Keong Ng. "Private Boolean Query Processing on Encrypted Data." In Information and Communications Security, 321–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50011-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dumas, Marlon, Luciano García-Bañuelos, and Peeter Laud. "Differential Privacy Analysis of Data Processing Workflows." In Graphical Models for Security, 62–79. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46263-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Heni, Houyem, and Faiez Gargouri. "A Methodological Approach for Big Data Security: Application for NoSQL Data Stores." In Neural Information Processing, 685–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26561-2_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data processing security"

1

Casey, Jason T., Stephen R. Lach, and John P. Kerekes. "Processing misregistered hyperspectral data." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2007. http://dx.doi.org/10.1117/12.720123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Kehar, G. Unnikrishnan, and Naveen K. Nishchal. "Photorefractive optical processing for data security." In International Symposium on Optical Science and Technology, edited by Francis T. S. Yu and Ruyan Guo. SPIE, 2002. http://dx.doi.org/10.1117/12.452711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nieves, Ruben D. "LIDAR data processing for scalable compression." In SPIE Defense, Security, and Sensing, edited by Monte D. Turner and Gary W. Kamerman. SPIE, 2013. http://dx.doi.org/10.1117/12.2029451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bartosz, Elizabeth E., Keith DeJong, Herbert A. Duvoisin, Geoff Z. Solomon, William J. Steinway, and Albert Warren. "Nonlinear processing of radar data for landmine detection." In Defense and Security, edited by Russell S. Harmon, J. Thomas Broach, and John H. Holloway, Jr. SPIE, 2004. http://dx.doi.org/10.1117/12.544312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Radzevicius, Stanley J., Brian T. Clark, and Timothy T. Webster. "Processing ground penetrating radar data from curvilinear interfaces." In Defense and Security, edited by Robert N. Trebits and James L. Kurtz. SPIE, 2005. http://dx.doi.org/10.1117/12.603796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xie, Wei, Feng Chu, Lipo Wang, and Eng Thiam Lim. "A fuzzy neural network for intelligent data processing." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2005. http://dx.doi.org/10.1117/12.603175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Elliot R., Marc C. Alban, Richard D. Garcia, and Kristopher C. Kozak. "Augmenting autonomous vehicle sensor processing with prior data." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Hoa G. Nguyen. SPIE, 2017. http://dx.doi.org/10.1117/12.2266706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shlyuger, Gregory. "Apply analytical grid processing to sensor data collections." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2017. http://dx.doi.org/10.1117/12.2269513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Runnels, Denise R., Chad M. Leflore, and Joseph J. Dirbas. "Hyperspectral data processing algorithm comparison software (HyperPACS)." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2007. http://dx.doi.org/10.1117/12.718134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Tong, Da-Xin Liu, Wei Sun, and Xuanzuo Lin. "Processing heterogeneous XML data from multi-source." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2006. http://dx.doi.org/10.1117/12.666467.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data processing security"

1

Johnston, B. L. Addendum, automatic data processing (ADP) security plan, Revision 1. ADP facility number: PNL-63. Office of Scientific and Technical Information (OSTI), June 1989. http://dx.doi.org/10.2172/10118490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

PALMER, M. E. Waste Receiving & Processing (WRAP) Facility Test Report For Data Management System (DMS) Security Test DMS-F81. Office of Scientific and Technical Information (OSTI), May 2001. http://dx.doi.org/10.2172/807106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

PALMER, M. E. Waste Receiving and Processing (WRAP) Facility PMS Test Report For Data Management System (DMS) Security Test DMS-Y2K. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/798056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Murdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/20200057.

Full text
Abstract:
New analytic tools are used in this data brief to explore the public artificial intelligence (AI) research portfolio of China’s security forces. The methods contextualize Chinese-language scholarly papers that claim a direct working affiliation with components of the Ministry of Public Security, People's Armed Police Force, and People’s Liberation Army. The authors review potential uses of computer vision, robotics, natural language processing and general AI research.
APA, Harvard, Vancouver, ISO, and other styles
5

Temple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, James I. Rineer, Daniel Lapidus, Kemen Austin, Katherine P. Woodward, and Robert H. Beach III. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, August 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.

Full text
Abstract:
Despite notable progress in reducing global poverty and hunger in recent decades, about one out of nine people in the world suffers from hunger and malnutrition. Stakeholders charged with making decisions pertaining to agricultural production, development priorities, and policies at a region-to-country scale require quantitative and up-to-date information on the types of crops being cultivated, the acreage under cultivation, and crop yields. However, many low- and middle-income countries lack the infrastructure and resources for frequent and extensive agricultural field surveys to obtain this information. Technology supports a change of paradigm. Traditional methods of obtaining agricultural information through field surveys are increasingly being augmented by images of the Earth acquired through sensors placed on satellites. The continued improvement in the resolution of satellite images, the establishment of open-access infrastructure for processing of the images, and the recent revolutionary progress in artificial intelligence make it feasible to obtain the information at low cost and in near-to-real time. In this brief, we discuss the use of satellite images to provide information about agricultural production in low-income countries, and we comment on research challenges and opportunities. We highlight the near-term potential of the methodology in the context of Rwanda, a country in sub-Saharan Africa whose government has recognized early the value of information technology in its strategic planning for food security and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
6

Federal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography