Academic literature on the topic 'Integrity Confidentiality'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Integrity Confidentiality.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Integrity Confidentiality"

1

Edgar, Andrew. "Confidentiality and Personal Integrity." Nursing Ethics 1, no. 2 (1994): 86–95. http://dx.doi.org/10.1177/096973309400100204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

CLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.

Full text
Abstract:
Three integrity measures are introduced: contamination, channel suppression and program suppression. Contamination is a measure of how much untrusted information reaches trusted outputs; it is the dual of leakage, which is a measure of information-flow confidentiality. Channel suppression is a measure of how much information about inputs to a noisy channel is missing from the channel outputs. And program suppression is a measure of how much information about the correct output of a program is lost because of attacker influence and implementation errors. Program and channel suppression do not h
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Santos, Tiago, and Carlos Serrão. "Granular Confidentiality and Integrity of JSON Messages." International Journal of Intelligent Computing Research 8, no. 2 (2017): 839–48. http://dx.doi.org/10.20533/ijicr.2042.4655.2017.0103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and Confidentiality in Cloud Outsourced Data." Ain Shams Engineering Journal 10, no. 2 (2019): 275–85. http://dx.doi.org/10.1016/j.asej.2019.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.

Full text
Abstract:
Abstract. Aiming at current problem of high computing overhead of encryption and authentication, this paper proposes a confidentiality and integrity protection method based on one time encryption. The method packages data block and verification data together, and then encrypts it. The confidentiality is guaranteed by traditional encryption mode and the integrity is guaranteed by decrypted verification data. Analysis and simulation show that the method has less time and space overhead than standard encryption and authentication mode. The method can be applied to other integrity and confidential
APA, Harvard, Vancouver, ISO, and other styles
7

Jo, Jeong Hoon, Shailendra Rathore, Vincenzo Loia, and Jong Hyuk Park. "A blockchain-based trusted security zone architecture." Electronic Library 37, no. 5 (2019): 796–810. http://dx.doi.org/10.1108/el-02-2019-0053.

Full text
Abstract:
Purpose The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data. Design/methodology/approach The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability
APA, Harvard, Vancouver, ISO, and other styles
8

Gallo, Paul. "Confidentiality and Trial Integrity Issues for Adaptive Designs." Drug Information Journal 40, no. 4 (2006): 445–50. http://dx.doi.org/10.1177/216847900604000410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Papadopoulos, Stavros, Aggelos Kiayias, and Dimitris Papadias. "Exact In-Network Aggregation with Integrity and Confidentiality." IEEE Transactions on Knowledge and Data Engineering 24, no. 10 (2012): 1760–73. http://dx.doi.org/10.1109/tkde.2012.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karismanda, Agrilia Priska, Lia Rachmawati, and Diana Dwi Astuti. "Pengaruh Integritas, Objektivitas, Kompetensi, Perilaku Profesional dan Kerahasiaan Terhadap Kualitas Audit Dengan Independensi Sebagai Variabel Moderasi (Pada Kantor Inspektorat Kabupaten Jember)." JAKUMA : JURNAL AKUNTANSI DAN MANAJEMEN KEUANGAN 1, no. 2 (2021): 1–25. http://dx.doi.org/10.31967/jakuma.v1i2.404.

Full text
Abstract:
The purpose of this study was to determine the effect of integrity, objectivity, competence, professional behavior and confidentiality on audit quality with independence as a moderating variable in the Inspectorate Jember office. The number of samples includes 30 people. The analytical method uses multiple linear regression, t test and moderation analysis with the classical assumption test research model, namely normality test, multicollinearity test, heteroscedasticity test. The results of this study state that objectivity partially affects audit quality, while integrity, competence, professi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Integrity Confidentiality"

1

Miklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ranj, Bar Amin. "Confidentiality and integrity management in online systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.

Full text
Abstract:
The dominant role of social networking in the web is turning human relations into conduits of information flow. This means that the way information spreads on the web is determined to a large extent by human decisions. Consequently, information security, confidentiality and integrity of shared data, relies on the quality of the collective decisions made by the users. Recently, many access control schemes have been proposed to control unauthorized propagation and modification of information in online systems; however, there is still a need for mechanisms to evaluate the risk of information leak
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.

Full text
Abstract:
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes certain cryptographic and security features integrated into the general purpose processor and computing platform to protect confidentiality and integrity of digital content stored in a computing system's memory. System designers can take advantages of the availability of the proposed security model to build future security systems such as systems with strong anti-reverse engineering capability, digital
APA, Harvard, Vancouver, ISO, and other styles
4

Ferradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.

Full text
Abstract:
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à clé publique : l’intégrité, l’authentification et la confidentialité. Au sein de chaque thème nous concevons des nouvelles primitives et améliorons des primitives existantes. Le premier chapitre, dédié à l’intégrité, introduit une preuve non-interactive de génération appropriée de clés publiques RSA et un protocole de co-signature dans lequel tout irrespect de l’équité laisse automatiquement la partie lésée en possession d’une preuve de culpabilité incriminant la partie tricheuse. Le second chapi
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Baolong. "XML security in XML data integrity, authentication, and confidentiality." Thesis, University of Huddersfield, 2010. http://eprints.hud.ac.uk/id/eprint/9671/.

Full text
Abstract:
The widely application of XML has increasingly required high security. XML security confronts some challenges that are strong relating to its features. XML data integrity needs to protect element location information and contextreferential meaning as well as data content integrity under fine-grained security situations. XML data authentication must satisfy a signing process under a dependent and independent multi-signature generation scenario. When several different sections are encrypted within the XML data, it cannot query the encrypted contents without decrypting the encrypted portions. The
APA, Harvard, Vancouver, ISO, and other styles
6

Rocha, Francisco. "Insider threat : memory confidentiality and integrity in the cloud." Thesis, University of Newcastle upon Tyne, 2015. http://hdl.handle.net/10443/2960.

Full text
Abstract:
The advantages of always available services, such as remote device backup or data storage, have helped the widespread adoption of cloud computing. However, cloud computing services challenge the traditional boundary between trusted inside and untrusted outside. A consumer’s data and applications are no longer in premises, fundamentally changing the scope of an insider threat. This thesis looks at the security risks associated with an insider threat. Specifically, we look into the critical challenge of assuring data confidentiality and integrity for the execution of arbitrary software in a cons
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Feifan. "Cross-platform data integrity and confidentiality with graduated access control." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60265.

Full text
Abstract:
Security of data is tightly coupled to its access policy. However, in practice, a data owner has control of his data’s access policies only as far as the boundaries of his own systems. We introduce graduated access control, which provides mobile, programmable, and dynamically-resolving policies for access control that extends a data owner’s policies across system boundaries. We realize this through a novel data-centric abstraction called trusted capsules and its associated system, the trusted data monitor. A trusted capsule couples data and policy into a single mobile unit. A capsule is backwa
APA, Harvard, Vancouver, ISO, and other styles
8

Lindner, Patricia J. "Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1554911833066868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Solum, Erik. "Achieving over-the-wire configurable confidentiality, integrity, authentication and availability in GridStat's status dissemination." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/e_solum_121807.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Panchapakesan, Santosh Kumar. "Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Integrity Confidentiality"

1

Ranj Bar, Amin, and Muthucumaru Maheswaran. Confidentiality and Integrity in Crowdsourcing Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-02717-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seminars, Unicom, ed. Information security: confidentiality, integrity and availability: 3-5 July 1990. Unicom Seminars, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sherry, Donna M. Legal issues of data security: Substantive and practical advice for protecting the confidentiality, integrity, and availability of data. Massachusetts Continuing Legal Education, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schifreen, Robert. Data protection and security for personal computers: A manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks. Elsevier Advanced Technology, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. A bill to amend title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of Social Security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. H.R. 220, the Freedom and Privacy Restoration Act: Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 220, to amend Title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of social security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons, May 18, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. H.R. 220, the Freedom and Privacy Restoration Act: Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 220, to amend Title II of the Social Security Act and the Internal Revenue Code of 1986 to protect the integrity and confidentiality of social security account numbers issued under such title, to prohibit the establishment in the federal government of any uniform national identifying number, and to prohibit federal agencies from imposing standards for identification of individuals on other agencies or persons, May 18, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Springer. Confidentiality and Integrity in Crowdsourcing Systems. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bar, Amin Ranj Ranj, and Muthucumaru Maheswaran. Confidentiality and Integrity in Crowdsourcing Systems. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

System Security: Confidentiality Integrity Continuity (Advanced computing series). Brookfield Pub Co, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Integrity Confidentiality"

1

Fagan, Peter. "Security = Confidentiality + Integrity + Availability." In The Business of Cyber. CRC Press, 2024. http://dx.doi.org/10.1201/9781003380962-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Delannoy, X. C., and C. Del Vigna. "Binary integrity constraints against confidentiality." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0034687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Hongjin, Huimin Meng, Nianmin Yao, and Yishun Cheng. "Memory Confidentiality and Integrity Protection Technology." In Lecture Notes in Electrical Engineering. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6508-9_130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spalka, Adrian, and Armin B. Cremers. "Confidentiality vs Integrity in Secure Databases." In Data and Application Security. Springer US, 2002. http://dx.doi.org/10.1007/0-306-47008-x_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maurer, Ueli, Andreas Rüedlinger, and Björn Tackmann. "Confidentiality and Integrity: A Constructive Perspective." In Theory of Cryptography. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28914-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Androulidakis, Iosif I. "Confidentiality, Integrity, and Availability Threats in PBXs." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29721-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Androulidakis, Iosif I. "Confidentiality, Integrity, and Availability Threats in PBXs." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1656-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shakiba-Herfeh, Mahdi, Arsenia Chorti, and H. Vincent Poor. "Physical Layer Security: Authentication, Integrity, and Confidentiality." In Physical Layer Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Lee. "Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information." In Health Informatics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91237-6_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Djeki, Essohanam, Carlyna Bondiombouy, and Jules Degila. "Data Confidentiality and Integrity in Cloud Storage Environment." In Communication and Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Integrity Confidentiality"

1

Mehta, Shiva, and Ravi Kumar. "Blockchain-powered Solutions for Ensuring IoVT Data Confidentiality and Integrity." In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT). IEEE, 2024. http://dx.doi.org/10.1109/iceect61758.2024.10739157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gousselot, Théophile, Jean-Max Dutertre, Olivier Potin, and Jean-Baptiste Rigaud. "Code Encryption for Confidentiality and Execution Integrity Down to Control Signals." In 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2025. https://doi.org/10.1109/host64725.2025.11050061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pratama Hartono, Ardhi Putra, Andrey Brito, and Christof Fetzer. "CRISP: Confidentiality, Rollback, and Integrity Storage Protection for Confidential Cloud-Native Computing." In 2024 IEEE 17th International Conference on Cloud Computing (CLOUD). IEEE, 2024. http://dx.doi.org/10.1109/cloud62652.2024.00026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Isnan, Mahmud, Gregorius Natanael Elwirehardja, Dedy Ariansyah, Reza Rahutomo, and Bens Pardamean. "Confidentiality. Integrity, and Availability (CIA) Approach for Private Dataset Management System Design." In 2024 9th International Conference on Information Technology and Digital Applications (ICITDA). IEEE, 2024. https://doi.org/10.1109/icitda64560.2024.10809935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shaik, Mohammed Ali, Vupulluri Sudha Rani, Afshan Fatima, Masrath Parveen, Juhi Juwairiyyah, and Nikhat Fatima. "Secure Data Exchange in Cloud Computing: Enhancing Confidentiality, Integrity, and Availability Through Data Partitioning and Encryption." In 2024 International Conference on Smart Technologies for Sustainable Development Goals (ICSTSDG). IEEE, 2024. https://doi.org/10.1109/icstsdg61998.2024.11026651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hammonds, Grace L. "Confidentiality, integrity, assured service." In Proceedings on the 1992-1993 workshop. ACM Press, 1993. http://dx.doi.org/10.1145/283751.283775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Kirti Dhwaj, Ayushi Sharma, Shivali Singh, Vikram Singh, and Sagar Rane. "Integrity and confidentiality preservation in cloud." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8212848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thao, Tran Phuong, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, and Ayumu Kubota. "Robust ORAM: Enhancing Availability, Confidentiality and Integrity." In 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2017. http://dx.doi.org/10.1109/prdc.2017.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Confidentiality and Integrity Mechanisms for Microservices Communication." In 5th International Conference on Computer Science and Information Technology (COMIT 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111701.

Full text
Abstract:
The microservices architecture tries to deal with the challenges posed by distributed systems, such as scalability, availability, and system deployment; by means of highly cohesive, heterogeneous, and independent microservices. However, this architecture also brings new security challenges related to communication, system design, development, and operation. The literature contains spread information regarding security related solutions for microservicesbased systems, but this spread makes difficult for practitioners to adopt novel security related solutions. In this study, we aim to present a
APA, Harvard, Vancouver, ISO, and other styles
10

Da Rocha Pires, Elaine Alves, Ivan Luiz Pedroso Pires, and Luiz Carlos Pessoa Albini. "Supporting Confidentiality and Integrity on V2V Communications." In 2022 International Conference on Connected Vehicle and Expo (ICCVE). IEEE, 2022. http://dx.doi.org/10.1109/iccve52871.2022.9742867.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Integrity Confidentiality"

1

Barde, Stephane Remy Antoine. The Art of Digitalization: A Dive into e-Estonia. Asian Productivity Organization, 2024. http://dx.doi.org/10.61145/iini4552.

Full text
Abstract:
Estonia is a digital transformation pioneer, offering valuable lessons to those hoping to follow a strategic approach to modernization. e-Estonia encompasses digital network development for education, healthcare, business, and citizens’ interactions with government based on the three pillars of confidentiality, availability, and integrity. X-Road, the backbone of e-Estonia, facilitates public service delivery, streamlines processes, and thereby lowers costs and raises citizens’ confidence in government. The citizen-centric approach and cross-border cooperation initiatives offer a guide for APO
APA, Harvard, Vancouver, ISO, and other styles
2

Data Encryption Standard. National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!