Academic literature on the topic 'Electronic data processing – Security systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic data processing – Security systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic data processing – Security systems"

1

Zhang, Zhun, Xiang Wang, Qiang Hao, et al. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (2021): 560. http://dx.doi.org/10.3390/mi12050560.

Full text
Abstract:
Dynamic data security in embedded systems is raising more and more concerns in numerous safety-critical applications. In particular, the data exchanges in embedded Systems-on-Chip (SoCs) using main memory are exposing many security vulnerabilities to external attacks, which will cause confidential information leakages and program execution failures for SoCs at key points. Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency data processing to
APA, Harvard, Vancouver, ISO, and other styles
2

Rathee, Geetanjali, Adel Khelifi, and Razi Iqbal. "Artificial Intelligence- (AI-) Enabled Internet of Things (IoT) for Secure Big Data Processing in Multihoming Networks." Wireless Communications and Mobile Computing 2021 (August 11, 2021): 1–9. http://dx.doi.org/10.1155/2021/5754322.

Full text
Abstract:
The automated techniques enabled with Artificial Neural Networks (ANN), Internet of Things (IoT), and cloud-based services affect the real-time analysis and processing of information in a variety of applications. In addition, multihoming is a type of network that combines various types of networks into a single environment while managing a huge amount of data. Nowadays, the big data processing and monitoring in multihoming networks provide less attention while reducing the security risk and efficiency during processing or monitoring the information. The use of AI-based systems in multihoming b
APA, Harvard, Vancouver, ISO, and other styles
3

Wilczyński, Andrzej, and Adrian Widłak. "Blockchain Networks – Security Aspects and Consensus Models." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 46–52. http://dx.doi.org/10.26636/jtit.2019.132019.

Full text
Abstract:
Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes stored in highly distributed networks and ICT infrastructures. BC enables secure data transfers in distributed systems without the need for all operations and processes in the network to be initiated and monitored by any central authority (system manager). This paper presents the background of a generic architectural mo
APA, Harvard, Vancouver, ISO, and other styles
4

Men, Hong, Donglin Chen, Xiaoting Zhang, Jingjing Liu, and Ke Ning. "Data Fusion of Electronic Nose and Electronic Tongue for Detection of Mixed Edible-Oil." Journal of Sensors 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/840685.

Full text
Abstract:
For the problem of the waste of the edible-oil in the food processing, on the premise of food security, they often need to add new edible-oil to the old frying oil which had been used in food processing to control the cost of the production. Due to the fact that the different additive proportion of the oil has different material and different volatile gases, we use fusion technology based on the electronic nose and electronic tongue to detect the blending ratio of the old frying oil and the new edible-oil in this paper. Principal component analysis (PCA) is used to distinguish the different pr
APA, Harvard, Vancouver, ISO, and other styles
5

Ross, M. K., Wei Wei, and L. Ohno-Machado. "“Big Data” and the Electronic Health Record." Yearbook of Medical Informatics 23, no. 01 (2014): 97–104. http://dx.doi.org/10.15265/iy-2014-0003.

Full text
Abstract:
Summary Objectives: Implementation of Electronic Health Record (EHR) systems continues to expand. The massive number of patient encounters results in high amounts of stored data. Transforming clinical data into knowledge to improve patient care has been the goal of biomedical informatics professionals for many decades, and this work is now increasingly recognized outside our field. In reviewing the literature for the past three years, we focus on “big data” in the context of EHR systems and we report on some examples of how secondary use of data has been put into practice. Methods: We searched
APA, Harvard, Vancouver, ISO, and other styles
6

Prokopowicz, Dariusz, Sylwia Gwoździewicz, Jan Grzegorek, and Mirosław Matosek. "DETERMINANTS OF THE SAFETY OF THE ELECTRONIC DAILY TRANSFER IN THE CONTEXT OF GLOBAL TRENDS ON THE INTERNET DEVELOPMENT OF THE MOBILE BANKING." International Journal of New Economics and Social Sciences 7, no. 1 (2018): 188–201. http://dx.doi.org/10.5604/01.3001.0012.2694.

Full text
Abstract:
Technological progress and the ongoing globalization processes determine new challenges for the protection, electronic transmission and processing of data, including classified information. According to the guidelines of the European Union Directive of 1995 in the perspective of the development of the Internet and digital society, the ICT infrastructure of individual entities should be modernized and adapted in order to guarantee the right to protect electronically-available information. The development of techniques for processing and providing information via the Internet is determined by ma
APA, Harvard, Vancouver, ISO, and other styles
7

Akhatov, A. R., and F. M. Nazarov. "METHODS OF IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGIES ON THE BASIS OF CRYPTOGRAPHIC PROTECTION FOR THE DATA PROCESSING SYSTEM WITH CONSTRAINT AND LAGGING INTO ELECTRONIC DOCUMENT MANAGEMEN." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 184 (October 2019): 3–12. http://dx.doi.org/10.14489/vkit.2019.10.pp.003-012.

Full text
Abstract:
The problem of application design by restriction and delay in ED (Electronic Document) management based on blockchain technologies to ensure a new level of security, reliability, transparency of data processing is considered. Increasing the reliability of information in systems by limiting and delaying ED management of enterprises and organizations during collecting, transmitting, storing and processing ED based on new, little-studied optimization technologies for processing blockchain-type data is a relevant and promising research topic. Important advantages of the potential use of transactio
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hsuan-Yu, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, and Chia-Hui Liu. "Security Privacy and Policy for Cryptographic Based Electronic Medical Information System." Sensors 21, no. 3 (2021): 713. http://dx.doi.org/10.3390/s21030713.

Full text
Abstract:
With the development of the internet, applications have become complicated, and the relevant technology has diversified. Compared with medical applications, the significance of information technology has been expanding to include clinical auxiliary functions of medical information. This includes electronic medical records, electronic prescriptions, medical information systems, etc. Although research on the data processing structure and format of various related systems is becoming mature, the integration is insufficient. An integrated medical information system with security policy and privacy
APA, Harvard, Vancouver, ISO, and other styles
9

Voloshynovskiy, S., T. Pun, J. Fridrich, F. Pérez-González, and N. Memon. "Security of data hiding technologies." Signal Processing 83, no. 10 (2003): 2065–67. http://dx.doi.org/10.1016/s0165-1684(03)00167-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fatokun, Tomilayo, Avishek Nag, and Sachin Sharma. "Towards a Blockchain Assisted Patient Owned System for Electronic Health Records." Electronics 10, no. 5 (2021): 580. http://dx.doi.org/10.3390/electronics10050580.

Full text
Abstract:
Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange between the different healthcare providers. The work proposes the shift from patient’s electronic health records being managed and controlled by the healthcare industry to a patient-centric application where patients are in control of their data. The aim of this research is to build an Electronic Healthcare Record (EHR) system that is layered on the E
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic data processing – Security systems"

1

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kwok, Tai-on Tyrone. "High performance embedded reconfigurable computing data security and media processing applications /." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3204043X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kwok, Tai-on Tyrone, and 郭泰安. "High performance embedded reconfigurable computing: data security and media processing applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3204043X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Chenyu. "Architectural support for improving security and performance of memory sub-systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26663.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009.<br>Committee Chair: Milos Prvulovic; Committee Member: Gabriel Loh; Committee Member: Hyesoon Kim; Committee Member: Umakishore Ramachandran; Committee Member: Yan Solihin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
5

Lydon, Andrew. "Compilation For Intrusion Detection Systems." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088179093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Widener, Patrick M. (Patrick McCall). "Dynamic Differential Data Protection for High-Performance and Pervasive Applications." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7239.

Full text
Abstract:
Modern distributed applications are long-lived, are expected to provide flexible and adaptive data services, and must meet the functionality and scalability challenges posed by dynamically changing user communities in heterogeneous execution environments. The practical implications of these requirements are that reconfiguration and upgrades are increasingly necessary, but opportunities to perform such tasks offline are greatly reduced. Developers are responding to this situation by dynamically extending or adjusting application functionality and by tuning application performance, a typical m
APA, Harvard, Vancouver, ISO, and other styles
7

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
8

Perelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.

Full text
Abstract:
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.

Full text
Abstract:
As digital data-collection has increased in scale and number, it becomes an important type of resource serving a wide community of researchers. Cross-institutional data-sharing and collaboration introduce a suitable approach to facilitate those research institutions that are suffering the lack of data and related IT infrastructures. Grid computing has become a widely adopted approach to enable cross-institutional resource-sharing and collaboration. It integrates a distributed and heterogeneous collection of locally managed users and resources. This project proposes a distributed data warehouse
APA, Harvard, Vancouver, ISO, and other styles
10

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Electronic data processing – Security systems"

1

T, Pritchard J. A., ed. Security in office systems. NCC Publications, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security of computer based information systems. Macmillan Education, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lane, V. P. Security of computer based information systems. Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Managing Risk in Information Systems. Jones & Bartlett Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bowman, Ronald H. Business continuity planning for data centers and systems: A strategic implementation guide. John Wiley & Sons, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Steinauer, Dennis. Security of personal computer systems: A management guide. U.S. Dept. of Commerce, National Bureau of Standards, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. Miller Freeman Inc., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1939-, Simons G. L., ed. Fraud and abuse of IT systems. NCC Publications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic data processing – Security systems"

1

Ellis, Mark. "Data Acquisition and Processing Systems." In Active Interrogation in Nuclear Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74467-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ibrahim, Ali, Luca Noli, Hussein Chible, and Maurizio Valle. "Embedded Electronic Systems for Tactile Data Processing." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47913-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Yaqin. "Public Security Big Data Processing Support Technology." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67071-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dawson, Steven, Shelly Qian, and Pierangela Samarati. "Providing Security and Interoperation of Heterogeneous Systems." In Security of Data and Transaction Processing. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonatti, Piero A., Sarit Kraus, Jose Salinas, and V. S. Subrahmanian. "Data-security in heterogeneous agent systems." In Cooperative Information Agents II Learning, Mobility and Electronic Commerce for Information Discovery on the Internet. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

George, Binto, and Jayant R. Haritsa. "Secure Concurrency Control in Firm Real-Time Database Systems." In Security of Data and Transaction Processing. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jäger, Markus, Jussi Nikander, Stefan Nadschläger, Van Quoc Phuong Huynh, and Josef Küng. "Focusing on Precision- and Trust-Propagation in Knowledge Processing Systems." In Future Data and Security Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bouleghlimat, Imene, and Salima Hacini. "Big Data Processing Security Issues in Cloud Environment." In Advances in Computing Systems and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98352-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Xihui, David Fonkwe, and Jun Pang. "Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems." In Data Privacy Management and Autonomous Spontaneous Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35890-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jäger, Markus, Trong Nhan Phan, Christian Huber, and Josef Küng. "Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems – An Approach." In Future Data and Security Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48057-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic data processing – Security systems"

1

Wang, Wei, Haining Luo, and Huiyu Deng. "Research on data and workflow security of electronic military systems." In 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2013. http://dx.doi.org/10.1109/icicip.2013.6568164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iskhakova, Anastasia. "Processing of Big Data Streams in Intelligent Electronic Data Analysis Systems." In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dalal, Kushal Rashmikant. "A Novel Hybrid data security algorithm for Electronic Health Records security." In 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS). IEEE, 2019. http://dx.doi.org/10.1109/csitss47250.2019.9031012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Premkumar, Anitha. "An Applicability of Blockchain Model in Business use Case - A Technical Approach." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110802.

Full text
Abstract:
Business network brings many organizations close together to achieve their desired goals and profit from it. People from different organizations may or may not know each other but still can be part of a business network. A major challenge with these business networks is how to provide trust among people and data security. Blockchain is another means through which many organizations in the current digital age are overcoming these problems with ease. Blockchains have also changed the way the business transactions with clients take place. Blockchain is a decentralized distributed ledger in a peer
APA, Harvard, Vancouver, ISO, and other styles
5

Priya, R., S. Sivasankaran, P. Ravisasthiri, and S. Sivachandiran. "A survey on security attacks in electronic healthcare systems." In 2017 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2017. http://dx.doi.org/10.1109/iccsp.2017.8286448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jianhong, Zhou, and Xie Yi. "Design of Customer Relationship Management Systems Based on Data Mining." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Woodie, Paul. "Distributed processing systems security: Communications, computer, or both." In 1986 IEEE Second International Conference on Data Engineering. IEEE, 1986. http://dx.doi.org/10.1109/icde.1986.7266271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maity, Chandan, Sourish Behera, Ashutosh Gupta, and Mahua Maity. "Concurrent data processing from multi-port antenna of passive UHF RFID reader." In Electronic Systems Technology (Wireless VITAE). IEEE, 2009. http://dx.doi.org/10.1109/wirelessvitae.2009.5172449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Havur, Giray, Miel Sande, and Sabrina Kirrane. "Greater Control and Transparency in Personal Data Processing." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009143206550662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gancheva, Veska. "Data Security and Validation Framework for a Scientific Data Processing SOA Based System." In 2011 Developments in E-systems Engineering (DeSE). IEEE, 2011. http://dx.doi.org/10.1109/dese.2011.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!