Journal articles on the topic 'Data processing security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data processing security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Littlejohns, C. S. "Word processing and data security." BMJ 298, no. 6677 (April 1, 1989): 893. http://dx.doi.org/10.1136/bmj.298.6677.893-b.
Full textEditorial. "Information Security and Multisensor Data Processing." Information & Security: An International Journal 2 (1999): 5–11. http://dx.doi.org/10.11610/isij.0200.
Full textJacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (March 1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.
Full textLahno, Valery. "ENSURING OF INFORMATION PROCESSES’ RELIABILITY AND SECURITY IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS." MEST Journal 2, no. 1 (January 15, 2014): 71–79. http://dx.doi.org/10.12709/mest.02.02.01.07.
Full textInieke, Otobong. "Data Security." International Journal of Digital Literacy and Digital Competence 10, no. 4 (October 2019): 25–39. http://dx.doi.org/10.4018/ijdldc.2019100102.
Full textBrown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Full textLi, Jun, and Yanzhao Liu. "An Efficient Data Analysis Framework for Online Security Processing." Journal of Computer Networks and Communications 2021 (April 1, 2021): 1–12. http://dx.doi.org/10.1155/2021/9290853.
Full textKumar, Narander, Vishal Verma, and Vipin Saxena. "A Security Algorithm for Online Analytical Processing Data Cube." International Journal of Computer Applications 79, no. 14 (October 18, 2013): 7–10. http://dx.doi.org/10.5120/13807-1768.
Full textKozin, I. S. "Blockchain-based technology for security processing of personal data." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 5 (October 1, 2019): 892–900. http://dx.doi.org/10.17586/2226-1494-2019-19-5-892-900.
Full textRohrlach, H. J. "Protection of privacy and security measures in data-processing." International Social Security Review 39, no. 1 (January 1986): 14–23. http://dx.doi.org/10.1111/j.1468-246x.1986.tb00603.x.
Full textSemenov, N. A., and A. A. Poltavtsev. "Cloud-Based Data Architecture Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 1056–64. http://dx.doi.org/10.3103/s0146411619080285.
Full textSankaramAlladi, Bhima, and Dr Srinivas Prasad. "Big data life cycle: security issues, challenges, threat and security model." International Journal of Engineering & Technology 7, no. 1.3 (December 31, 2017): 100. http://dx.doi.org/10.14419/ijet.v7i1.3.9666.
Full textAlbeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.
Full textLi, Zhihua, Zianfei Tang, and Yihua Yang. "Research on architecture of security video surveillance network cascade system with big data." World Journal of Engineering 13, no. 1 (February 8, 2016): 77–81. http://dx.doi.org/10.1108/wje-02-2016-010.
Full textShkirdov, D. A., E. S. Sagatov, and P. S. Dmitrenko. "Trap method in ensuring data security." Information Technology and Nanotechnology, no. 2416 (2019): 189–98. http://dx.doi.org/10.18287/1613-0073-2019-2416-189-198.
Full textSun, Lei, Ji Ling Tang, and Qin Sheng Du. "Data Collection and Processing of Cloud Security Botnet Protection System." Applied Mechanics and Materials 727-728 (January 2015): 923–25. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.923.
Full textLi, Na. "Body Sensor Network Processing Mechanism for Micro-Data Security Publishing." Advanced Materials Research 1049-1050 (October 2014): 1536–39. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1536.
Full textLakshmanan, S., M. Ahamad, and H. Venkateswaran. "Responsive security for stored data." IEEE Transactions on Parallel and Distributed Systems 14, no. 9 (September 2003): 818–28. http://dx.doi.org/10.1109/tpds.2003.1233705.
Full textSuparni, Suparni, Lilyani Asri Utami, and Elsa Dwi Selviana. "Property Sales Data Processing Information System (SiPendar)." SinkrOn 3, no. 2 (March 16, 2019): 180. http://dx.doi.org/10.33395/sinkron.v3i2.10084.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textSirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.
Full textGrusho, A. A., N. A. Grusho, M. I. Zabezhailo, and E. E. Timonina. "Intelligent data analysis in information security." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 722–25. http://dx.doi.org/10.3103/s0146411616080307.
Full textGao, Lei. "Exploring the Data Processing Practices of Cloud ERP—A Case Study." Journal of Emerging Technologies in Accounting 17, no. 1 (November 1, 2019): 63–70. http://dx.doi.org/10.2308/jeta-52680.
Full textLi, Qian Mu, Rui Wang, Jie Yin, and Jun Hou. "The Design of Data Security Synchronization in the Network of Satellite and Ground Security Management Instrument." Key Engineering Materials 439-440 (June 2010): 208–14. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.208.
Full textDronov, Vadim, Galina Dronova, Victor Belov, Lev Grishchenko, and Sergei Zyryanov. "Automation of data processing in the process of information security audit." Transaction of Scientific Papers of the Novosibirsk State Technical University, no. 1 (February 25, 2021): 64–79. http://dx.doi.org/10.17212/2307-6879-2021-1-64-79.
Full textTofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.
Full textIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Full textPoltavtseva, M. A., D. P. Zegzhda, and M. O. Kalinin. "Big Data Management System Security Threat Model." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 903–13. http://dx.doi.org/10.3103/s0146411619080261.
Full textPatial, Abhishek, and Sunny Behal. "RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 34–38. http://dx.doi.org/10.24297/ijct.v3i1a.2724.
Full textALI-PACHA, Hana, Naima HADJ-SAID, and Adda ALI-PACHA. "Data security based on homographic function." Pattern Recognition Letters 129 (January 2020): 240–46. http://dx.doi.org/10.1016/j.patrec.2019.10.032.
Full textVoloshynovskiy, S., T. Pun, J. Fridrich, F. Pérez-González, and N. Memon. "Security of data hiding technologies." Signal Processing 83, no. 10 (October 2003): 2065–67. http://dx.doi.org/10.1016/s0165-1684(03)00167-1.
Full textKasim, Rachmat, Retno Kusumaningrum, and Hamka Witri Kamase. "Implementation of Web Service in Processing of Data Base Financing Costumer Using Fragmentation Method." E3S Web of Conferences 73 (2018): 13025. http://dx.doi.org/10.1051/e3sconf/20187313025.
Full textViana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.
Full textGolubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (May 10, 2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.
Full textBhuvanya, R., K. Vijayalakshmi, S. Uma, and A. A.Suresh. "Secret data sharing using steganography and image processing." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 100. http://dx.doi.org/10.14419/ijet.v7i1.7.9584.
Full textChandrakumar, T., and S. Parthasarathy. "Enhancing Data Security in ERP Projects Using XML." International Journal of Enterprise Information Systems 8, no. 1 (January 2012): 51–65. http://dx.doi.org/10.4018/jeis.2012010104.
Full textEngouang, Tristan Daladier, Yun Liu, and Zhen Jiang Zhang. "Trusted Data Aggregation with Low Energy in Wireless Sensor Networks." Applied Mechanics and Materials 596 (July 2014): 519–27. http://dx.doi.org/10.4028/www.scientific.net/amm.596.519.
Full textBuldakova, T. I., and A. Sh Dzhalolov. "Analysis of data processes and choices of data-processing and security technologies in situation centers." Scientific and Technical Information Processing 39, no. 2 (April 2012): 127–32. http://dx.doi.org/10.3103/s0147688212020116.
Full textChen, Min. "A Hierarchical Security Model for Multimedia Big Data." International Journal of Multimedia Data Engineering and Management 5, no. 1 (January 2014): 1–13. http://dx.doi.org/10.4018/ijmdem.2014010101.
Full textJiang, Wei, and Feng Yang. "Applied-Information Technology in Research of Security Processing Based on IOT Data." Advanced Materials Research 908 (March 2014): 509–12. http://dx.doi.org/10.4028/www.scientific.net/amr.908.509.
Full textDuan, Chun Mei. "Design of Big Data Processing System Architecture Based on Hadoop under the Cloud Computing." Applied Mechanics and Materials 556-562 (May 2014): 6302–6. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6302.
Full textDai, Wei, Xuefang Zhang, and Peng Hu. "A Study on Security Technique of Cloud Data Processing in Electronic Commerce." International Journal of Security and Its Applications 8, no. 2 (March 31, 2014): 283–90. http://dx.doi.org/10.14257/ijsia.2014.8.2.29.
Full textRaihan, Md, Kh Mohaimenul, and Md Mehedi. "Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB." International Journal of Computer Applications 148, no. 1 (August 16, 2016): 1–3. http://dx.doi.org/10.5120/ijca2016909946.
Full textLv, Haicui. "Application of Information Security in Image Encryption Processing Based on Big Data." Journal of Physics: Conference Series 1881, no. 4 (April 1, 2021): 042010. http://dx.doi.org/10.1088/1742-6596/1881/4/042010.
Full textKhvostov, Victor A., Alexey V. Skrypnikov, Evgeniy A. Rogozin, Ludmila A. Obuhova, and Dmitriy G. Silka. "Analysis of information security threats when processing confidential data in mobile systems." Bezopasnost informacionnyh tehnology 28, no. 1 (January 2021): 95–105. http://dx.doi.org/10.26583/bit.2021.1.08.
Full textMuneeswari, G., M. Mahalakshmi, S. Lokeshwari, and R. Yashini. "Dynamic Data Compression and Security Based Algorithm for Big Sensing Data." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 182. http://dx.doi.org/10.14419/ijet.v7i2.24.12026.
Full textPoltavtseva, M. A., and M. O. Kalinin. "Modeling Big Data Management Systems in Information Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 895–902. http://dx.doi.org/10.3103/s014641161908025x.
Full textTripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (June 1, 2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.
Full textPriyadarshini, Rojalina, Rabindra Kumar Barik, Harish Chandra Dubey, and Brojo Kishore Mishra. "A Survey of Fog Computing-Based Healthcare Big Data Analytics and Its Security." International Journal of Ambient Computing and Intelligence 12, no. 2 (April 2021): 53–72. http://dx.doi.org/10.4018/ijaci.2021040104.
Full textKaur, Jaspreet, and Navdeep Kaler. "DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7081–91. http://dx.doi.org/10.24297/ijct.v17i1.6930.
Full text