Academic literature on the topic 'Electronic data processing – Security systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic data processing – Security systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Electronic data processing – Security systems"
Zhang, Zhun, Xiang Wang, Qiang Hao, et al. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (2021): 560. http://dx.doi.org/10.3390/mi12050560.
Full textRathee, Geetanjali, Adel Khelifi, and Razi Iqbal. "Artificial Intelligence- (AI-) Enabled Internet of Things (IoT) for Secure Big Data Processing in Multihoming Networks." Wireless Communications and Mobile Computing 2021 (August 11, 2021): 1–9. http://dx.doi.org/10.1155/2021/5754322.
Full textWilczyński, Andrzej, and Adrian Widłak. "Blockchain Networks – Security Aspects and Consensus Models." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 46–52. http://dx.doi.org/10.26636/jtit.2019.132019.
Full textMen, Hong, Donglin Chen, Xiaoting Zhang, Jingjing Liu, and Ke Ning. "Data Fusion of Electronic Nose and Electronic Tongue for Detection of Mixed Edible-Oil." Journal of Sensors 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/840685.
Full textRoss, M. K., Wei Wei, and L. Ohno-Machado. "“Big Data” and the Electronic Health Record." Yearbook of Medical Informatics 23, no. 01 (2014): 97–104. http://dx.doi.org/10.15265/iy-2014-0003.
Full textProkopowicz, Dariusz, Sylwia Gwoździewicz, Jan Grzegorek, and Mirosław Matosek. "DETERMINANTS OF THE SAFETY OF THE ELECTRONIC DAILY TRANSFER IN THE CONTEXT OF GLOBAL TRENDS ON THE INTERNET DEVELOPMENT OF THE MOBILE BANKING." International Journal of New Economics and Social Sciences 7, no. 1 (2018): 188–201. http://dx.doi.org/10.5604/01.3001.0012.2694.
Full textAkhatov, A. R., and F. M. Nazarov. "METHODS OF IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGIES ON THE BASIS OF CRYPTOGRAPHIC PROTECTION FOR THE DATA PROCESSING SYSTEM WITH CONSTRAINT AND LAGGING INTO ELECTRONIC DOCUMENT MANAGEMEN." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 184 (October 2019): 3–12. http://dx.doi.org/10.14489/vkit.2019.10.pp.003-012.
Full textChen, Hsuan-Yu, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, and Chia-Hui Liu. "Security Privacy and Policy for Cryptographic Based Electronic Medical Information System." Sensors 21, no. 3 (2021): 713. http://dx.doi.org/10.3390/s21030713.
Full textVoloshynovskiy, S., T. Pun, J. Fridrich, F. Pérez-González, and N. Memon. "Security of data hiding technologies." Signal Processing 83, no. 10 (2003): 2065–67. http://dx.doi.org/10.1016/s0165-1684(03)00167-1.
Full textFatokun, Tomilayo, Avishek Nag, and Sachin Sharma. "Towards a Blockchain Assisted Patient Owned System for Electronic Health Records." Electronics 10, no. 5 (2021): 580. http://dx.doi.org/10.3390/electronics10050580.
Full textDissertations / Theses on the topic "Electronic data processing – Security systems"
Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.
Full textKwok, Tai-on Tyrone. "High performance embedded reconfigurable computing data security and media processing applications /." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3204043X.
Full textKwok, Tai-on Tyrone, and 郭泰安. "High performance embedded reconfigurable computing: data security and media processing applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3204043X.
Full textYan, Chenyu. "Architectural support for improving security and performance of memory sub-systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26663.
Full textLydon, Andrew. "Compilation For Intrusion Detection Systems." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088179093.
Full textWidener, Patrick M. (Patrick McCall). "Dynamic Differential Data Protection for High-Performance and Pervasive Applications." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7239.
Full textMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full textPerelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.
Full textLi, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.
Full textBeckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Full textBooks on the topic "Electronic data processing – Security systems"
Managing Risk in Information Systems. Jones & Bartlett Publishers, Incorporated, 2010.
Find full textBowman, Ronald H. Business continuity planning for data centers and systems: A strategic implementation guide. John Wiley & Sons, 2008.
Find full textSteinauer, Dennis. Security of personal computer systems: A management guide. U.S. Dept. of Commerce, National Bureau of Standards, 1985.
Find full textPeltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. Miller Freeman Inc., 1991.
Find full textDavies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Wiley, 1989.
Find full textCheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2001.
Find full textBook chapters on the topic "Electronic data processing – Security systems"
Ellis, Mark. "Data Acquisition and Processing Systems." In Active Interrogation in Nuclear Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74467-4_7.
Full textIbrahim, Ali, Luca Noli, Hussein Chible, and Maurizio Valle. "Embedded Electronic Systems for Tactile Data Processing." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47913-2_3.
Full textZhou, Yaqin. "Public Security Big Data Processing Support Technology." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67071-3_22.
Full textDawson, Steven, Shelly Qian, and Pierangela Samarati. "Providing Security and Interoperation of Heterogeneous Systems." In Security of Data and Transaction Processing. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6_5.
Full textBonatti, Piero A., Sarit Kraus, Jose Salinas, and V. S. Subrahmanian. "Data-security in heterogeneous agent systems." In Cooperative Information Agents II Learning, Mobility and Electronic Commerce for Information Discovery on the Internet. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053692.
Full textGeorge, Binto, and Jayant R. Haritsa. "Secure Concurrency Control in Firm Real-Time Database Systems." In Security of Data and Transaction Processing. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6_3.
Full textJäger, Markus, Jussi Nikander, Stefan Nadschläger, Van Quoc Phuong Huynh, and Josef Küng. "Focusing on Precision- and Trust-Propagation in Knowledge Processing Systems." In Future Data and Security Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_28.
Full textBouleghlimat, Imene, and Salima Hacini. "Big Data Processing Security Issues in Cloud Environment." In Advances in Computing Systems and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98352-3_4.
Full textChen, Xihui, David Fonkwe, and Jun Pang. "Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems." In Data Privacy Management and Autonomous Spontaneous Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35890-6_3.
Full textJäger, Markus, Trong Nhan Phan, Christian Huber, and Josef Küng. "Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems – An Approach." In Future Data and Security Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48057-2_1.
Full textConference papers on the topic "Electronic data processing – Security systems"
Wang, Wei, Haining Luo, and Huiyu Deng. "Research on data and workflow security of electronic military systems." In 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2013. http://dx.doi.org/10.1109/icicip.2013.6568164.
Full textIskhakova, Anastasia. "Processing of Big Data Streams in Intelligent Electronic Data Analysis Systems." In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.3.
Full textDalal, Kushal Rashmikant. "A Novel Hybrid data security algorithm for Electronic Health Records security." In 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS). IEEE, 2019. http://dx.doi.org/10.1109/csitss47250.2019.9031012.
Full textPremkumar, Anitha. "An Applicability of Blockchain Model in Business use Case - A Technical Approach." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110802.
Full textPriya, R., S. Sivasankaran, P. Ravisasthiri, and S. Sivachandiran. "A survey on security attacks in electronic healthcare systems." In 2017 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2017. http://dx.doi.org/10.1109/iccsp.2017.8286448.
Full textJianhong, Zhou, and Xie Yi. "Design of Customer Relationship Management Systems Based on Data Mining." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.206.
Full textWoodie, Paul. "Distributed processing systems security: Communications, computer, or both." In 1986 IEEE Second International Conference on Data Engineering. IEEE, 1986. http://dx.doi.org/10.1109/icde.1986.7266271.
Full textMaity, Chandan, Sourish Behera, Ashutosh Gupta, and Mahua Maity. "Concurrent data processing from multi-port antenna of passive UHF RFID reader." In Electronic Systems Technology (Wireless VITAE). IEEE, 2009. http://dx.doi.org/10.1109/wirelessvitae.2009.5172449.
Full textHavur, Giray, Miel Sande, and Sabrina Kirrane. "Greater Control and Transparency in Personal Data Processing." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009143206550662.
Full textGancheva, Veska. "Data Security and Validation Framework for a Scientific Data Processing SOA Based System." In 2011 Developments in E-systems Engineering (DeSE). IEEE, 2011. http://dx.doi.org/10.1109/dese.2011.75.
Full text