Academic literature on the topic 'Integrity Confidentiality'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Integrity Confidentiality.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Integrity Confidentiality"
Edgar, Andrew. "Confidentiality and Personal Integrity." Nursing Ethics 1, no. 2 (1994): 86–95. http://dx.doi.org/10.1177/096973309400100204.
Full textCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Full textJain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.
Full textSantos, Tiago, and Carlos Serrão. "Granular Confidentiality and Integrity of JSON Messages." International Journal of Intelligent Computing Research 8, no. 2 (2017): 839–48. http://dx.doi.org/10.20533/ijicr.2042.4655.2017.0103.
Full textRady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and Confidentiality in Cloud Outsourced Data." Ain Shams Engineering Journal 10, no. 2 (2019): 275–85. http://dx.doi.org/10.1016/j.asej.2019.03.002.
Full textGuan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.
Full textJo, Jeong Hoon, Shailendra Rathore, Vincenzo Loia, and Jong Hyuk Park. "A blockchain-based trusted security zone architecture." Electronic Library 37, no. 5 (2019): 796–810. http://dx.doi.org/10.1108/el-02-2019-0053.
Full textGallo, Paul. "Confidentiality and Trial Integrity Issues for Adaptive Designs." Drug Information Journal 40, no. 4 (2006): 445–50. http://dx.doi.org/10.1177/216847900604000410.
Full textPapadopoulos, Stavros, Aggelos Kiayias, and Dimitris Papadias. "Exact In-Network Aggregation with Integrity and Confidentiality." IEEE Transactions on Knowledge and Data Engineering 24, no. 10 (2012): 1760–73. http://dx.doi.org/10.1109/tkde.2012.64.
Full textKarismanda, Agrilia Priska, Lia Rachmawati, and Diana Dwi Astuti. "Pengaruh Integritas, Objektivitas, Kompetensi, Perilaku Profesional dan Kerahasiaan Terhadap Kualitas Audit Dengan Independensi Sebagai Variabel Moderasi (Pada Kantor Inspektorat Kabupaten Jember)." JAKUMA : JURNAL AKUNTANSI DAN MANAJEMEN KEUANGAN 1, no. 2 (2021): 1–25. http://dx.doi.org/10.31967/jakuma.v1i2.404.
Full textDissertations / Theses on the topic "Integrity Confidentiality"
Miklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Full textRanj, Bar Amin. "Confidentiality and integrity management in online systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.
Full textShi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.
Full textFerradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.
Full textLiu, Baolong. "XML security in XML data integrity, authentication, and confidentiality." Thesis, University of Huddersfield, 2010. http://eprints.hud.ac.uk/id/eprint/9671/.
Full textRocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.
Full textChen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.
Full textLindner, Patricia J. "Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1554911833066868.
Full textSolum, Erik. "Achieving over-the-wire configurable confidentiality, integrity, authentication and availability in GridStat's status dissemination." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/e_solum_121807.pdf.
Full textPanchapakesan, Santosh Kumar. "Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity." [Ames, Iowa : Iowa State University], 2008.
Find full textBooks on the topic "Integrity Confidentiality"
Ranj Bar, Amin, and Muthucumaru Maheswaran. Confidentiality and Integrity in Crowdsourcing Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-02717-3.
Full textSeminars, Unicom, ed. Information security: confidentiality, integrity and availability: 3-5 July 1990. Unicom Seminars, 1990.
Find full textSherry, Donna M. Legal issues of data security: Substantive and practical advice for protecting the confidentiality, integrity, and availability of data. Massachusetts Continuing Legal Education, 2002.
Find full textSchifreen, Robert. Data protection and security for personal computers: A manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks. Elsevier Advanced Technology, 1992.
Find full textUnited States. Congress. House. A bill to amend title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of Social Security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons. U.S. G.P.O., 1999.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. H.R. 220, the Freedom and Privacy Restoration Act: Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 220, to amend Title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of social security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons, May 18, 2000. U.S. G.P.O., 2001.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. H.R. 220, the Freedom and Privacy Restoration Act: Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 220, to amend Title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of social security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons, May 18, 2000. U.S. G.P.O., 2001.
Find full textSpringer. Confidentiality and Integrity in Crowdsourcing Systems. Springer London, Limited, 2013.
Find full textBar, Amin Ranj Ranj, and Muthucumaru Maheswaran. Confidentiality and Integrity in Crowdsourcing Systems. Springer, 2013.
Find full textSystem Security: Confidentiality Integrity Continuity (Advanced computing series). Brookfield Pub Co, 1986.
Find full textBook chapters on the topic "Integrity Confidentiality"
Fagan, Peter. "Security = Confidentiality + Integrity + Availability." In The Business of Cyber. CRC Press, 2024. http://dx.doi.org/10.1201/9781003380962-4.
Full textDelannoy, X. C., and C. Del Vigna. "Binary integrity constraints against confidentiality." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0034687.
Full textWang, Hongjin, Huimin Meng, Nianmin Yao, and Yishun Cheng. "Memory Confidentiality and Integrity Protection Technology." In Lecture Notes in Electrical Engineering. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6508-9_130.
Full textSpalka, Adrian, and Armin B. Cremers. "Confidentiality vs Integrity in Secure Databases." In Data and Application Security. Springer US, 2002. http://dx.doi.org/10.1007/0-306-47008-x_18.
Full textMaurer, Ueli, Andreas Rüedlinger, and Björn Tackmann. "Confidentiality and Integrity: A Constructive Perspective." In Theory of Cryptography. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28914-9_12.
Full textAndroulidakis, Iosif I. "Confidentiality, Integrity, and Availability Threats in PBXs." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29721-7_2.
Full textAndroulidakis, Iosif I. "Confidentiality, Integrity, and Availability Threats in PBXs." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1656-2_2.
Full textShakiba-Herfeh, Mahdi, Arsenia Chorti, and H. Vincent Poor. "Physical Layer Security: Authentication, Integrity, and Confidentiality." In Physical Layer Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_6.
Full textKim, Lee. "Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information." In Health Informatics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91237-6_26.
Full textDjeki, Essohanam, Carlyna Bondiombouy, and Jules Degila. "Data Confidentiality and Integrity in Cloud Storage Environment." In Communication and Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_77.
Full textConference papers on the topic "Integrity Confidentiality"
Mehta, Shiva, and Ravi Kumar. "Blockchain-powered Solutions for Ensuring IoVT Data Confidentiality and Integrity." In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT). IEEE, 2024. http://dx.doi.org/10.1109/iceect61758.2024.10739157.
Full textGousselot, Théophile, Jean-Max Dutertre, Olivier Potin, and Jean-Baptiste Rigaud. "Code Encryption for Confidentiality and Execution Integrity Down to Control Signals." In 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2025. https://doi.org/10.1109/host64725.2025.11050061.
Full textPratama Hartono, Ardhi Putra, Andrey Brito, and Christof Fetzer. "CRISP: Confidentiality, Rollback, and Integrity Storage Protection for Confidential Cloud-Native Computing." In 2024 IEEE 17th International Conference on Cloud Computing (CLOUD). IEEE, 2024. http://dx.doi.org/10.1109/cloud62652.2024.00026.
Full textIsnan, Mahmud, Gregorius Natanael Elwirehardja, Dedy Ariansyah, Reza Rahutomo, and Bens Pardamean. "Confidentiality. Integrity, and Availability (CIA) Approach for Private Dataset Management System Design." In 2024 9th International Conference on Information Technology and Digital Applications (ICITDA). IEEE, 2024. https://doi.org/10.1109/icitda64560.2024.10809935.
Full textShaik, Mohammed Ali, Vupulluri Sudha Rani, Afshan Fatima, Masrath Parveen, Juhi Juwairiyyah, and Nikhat Fatima. "Secure Data Exchange in Cloud Computing: Enhancing Confidentiality, Integrity, and Availability Through Data Partitioning and Encryption." In 2024 International Conference on Smart Technologies for Sustainable Development Goals (ICSTSDG). IEEE, 2024. https://doi.org/10.1109/icstsdg61998.2024.11026651.
Full textHammonds, Grace L. "Confidentiality, integrity, assured service." In Proceedings on the 1992-1993 workshop. ACM Press, 1993. http://dx.doi.org/10.1145/283751.283775.
Full textSingh, Kirti Dhwaj, Ayushi Sharma, Shivali Singh, Vikram Singh, and Sagar Rane. "Integrity and confidentiality preservation in cloud." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8212848.
Full textThao, Tran Phuong, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, and Ayumu Kubota. "Robust ORAM: Enhancing Availability, Confidentiality and Integrity." In 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2017. http://dx.doi.org/10.1109/prdc.2017.14.
Full textLeines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Confidentiality and Integrity Mechanisms for Microservices Communication." In 5th International Conference on Computer Science and Information Technology (COMIT 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111701.
Full textDa Rocha Pires, Elaine Alves, Ivan Luiz Pedroso Pires, and Luiz Carlos Pessoa Albini. "Supporting Confidentiality and Integrity on V2V Communications." In 2022 International Conference on Connected Vehicle and Expo (ICCVE). IEEE, 2022. http://dx.doi.org/10.1109/iccve52871.2022.9742867.
Full textReports on the topic "Integrity Confidentiality"
Barde, Stephane Remy Antoine. The Art of Digitalization: A Dive into e-Estonia. Asian Productivity Organization, 2024. http://dx.doi.org/10.61145/iini4552.
Full textData Encryption Standard. National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full text