To see the other types of publications on this topic, follow the link: Integrity Confidentiality.

Journal articles on the topic 'Integrity Confidentiality'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Integrity Confidentiality.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Edgar, Andrew. "Confidentiality and Personal Integrity." Nursing Ethics 1, no. 2 (1994): 86–95. http://dx.doi.org/10.1177/096973309400100204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

CLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.

Full text
Abstract:
Three integrity measures are introduced: contamination, channel suppression and program suppression. Contamination is a measure of how much untrusted information reaches trusted outputs; it is the dual of leakage, which is a measure of information-flow confidentiality. Channel suppression is a measure of how much information about inputs to a noisy channel is missing from the channel outputs. And program suppression is a measure of how much information about the correct output of a program is lost because of attacker influence and implementation errors. Program and channel suppression do not h
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Santos, Tiago, and Carlos Serrão. "Granular Confidentiality and Integrity of JSON Messages." International Journal of Intelligent Computing Research 8, no. 2 (2017): 839–48. http://dx.doi.org/10.20533/ijicr.2042.4655.2017.0103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and Confidentiality in Cloud Outsourced Data." Ain Shams Engineering Journal 10, no. 2 (2019): 275–85. http://dx.doi.org/10.1016/j.asej.2019.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.

Full text
Abstract:
Abstract. Aiming at current problem of high computing overhead of encryption and authentication, this paper proposes a confidentiality and integrity protection method based on one time encryption. The method packages data block and verification data together, and then encrypts it. The confidentiality is guaranteed by traditional encryption mode and the integrity is guaranteed by decrypted verification data. Analysis and simulation show that the method has less time and space overhead than standard encryption and authentication mode. The method can be applied to other integrity and confidential
APA, Harvard, Vancouver, ISO, and other styles
7

Jo, Jeong Hoon, Shailendra Rathore, Vincenzo Loia, and Jong Hyuk Park. "A blockchain-based trusted security zone architecture." Electronic Library 37, no. 5 (2019): 796–810. http://dx.doi.org/10.1108/el-02-2019-0053.

Full text
Abstract:
Purpose The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data. Design/methodology/approach The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability
APA, Harvard, Vancouver, ISO, and other styles
8

Gallo, Paul. "Confidentiality and Trial Integrity Issues for Adaptive Designs." Drug Information Journal 40, no. 4 (2006): 445–50. http://dx.doi.org/10.1177/216847900604000410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Papadopoulos, Stavros, Aggelos Kiayias, and Dimitris Papadias. "Exact In-Network Aggregation with Integrity and Confidentiality." IEEE Transactions on Knowledge and Data Engineering 24, no. 10 (2012): 1760–73. http://dx.doi.org/10.1109/tkde.2012.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karismanda, Agrilia Priska, Lia Rachmawati, and Diana Dwi Astuti. "Pengaruh Integritas, Objektivitas, Kompetensi, Perilaku Profesional dan Kerahasiaan Terhadap Kualitas Audit Dengan Independensi Sebagai Variabel Moderasi (Pada Kantor Inspektorat Kabupaten Jember)." JAKUMA : JURNAL AKUNTANSI DAN MANAJEMEN KEUANGAN 1, no. 2 (2021): 1–25. http://dx.doi.org/10.31967/jakuma.v1i2.404.

Full text
Abstract:
The purpose of this study was to determine the effect of integrity, objectivity, competence, professional behavior and confidentiality on audit quality with independence as a moderating variable in the Inspectorate Jember office. The number of samples includes 30 people. The analytical method uses multiple linear regression, t test and moderation analysis with the classical assumption test research model, namely normality test, multicollinearity test, heteroscedasticity test. The results of this study state that objectivity partially affects audit quality, while integrity, competence, professi
APA, Harvard, Vancouver, ISO, and other styles
11

H.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.

Full text
Abstract:
Authentication, Authorization, integrity, availability and confidentiality are important aspects in cloud computing services. Cloud services market demands can be increased by enhancing the authentication, data confidentiality and customer trust. To achieve strong authentication, security and to earn customer trust, we had proposed and published secure cloud transmission protocol (SecCTP) which describes SecCTP techniques in detail. In this paper, we evaluated the SecCTP and presented the GUI implementation. We discuss the applicability, usefulness and advantages of SecCTP techniques i.e. mult
APA, Harvard, Vancouver, ISO, and other styles
12

Chandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654. http://dx.doi.org/10.11591/ijece.v15i1.pp654-668.

Full text
Abstract:
Information-centric networks (ICNs) face challenges in ensuring content integrity and authentication while preserving user privacy. Homomorphic encryption has been widely used to protect content privacy within ICNs. Blockchain technology is widely applied in ICNs to ensure content integrity. Conventional blockchain-based authentication schemes rely on computationally expensive homomorphic encryption to perform secure data transmission. Also, the existing cryptography methods comprise confidentiality, and integrity while sharing content in ICNs. This paper proposes a novel lightweight blockchai
APA, Harvard, Vancouver, ISO, and other styles
13

Chandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654–68. https://doi.org/10.11591/ijece.v15i1.pp654-668.

Full text
Abstract:
Information-centric networks (ICNs) face challenges in ensuring content  integrity and authentication while preserving user privacy. Homomorphic encryption has been widely used to protect content privacy within ICNs. Blockchain technology is widely applied in ICNs to ensure content integrity. Conventional blockchain-based authentication schemes rely on computationally expensive homomorphic encryption to perform secure data transmission. Also, the existing cryptography methods comprise confidentiality, and integrity while sharing content in ICNs. This paper&nb
APA, Harvard, Vancouver, ISO, and other styles
14

Ali Ibn Abduh Muhammad Osimi Hakami. "Blocking the Pretexts for Investigation Confidentiality in the Saudi Criminal Procedure Code." Journal of Information Systems Engineering and Management 10, no. 40s (2025): 525–33. https://doi.org/10.52783/jisem.v10i40s.7323.

Full text
Abstract:
The confidentiality of investigations is a fundamental principle of criminal procedure, distinct from the public nature of trials. While public trials promote transparency and fairness, public investigations can hinder the proper collection and evaluation of evidence. This study explores the role of confidentiality in investigations within the legal principle of blocking pretexts, emphasizing that confidentiality prevents the loss of innocence and justice, as well as the potential tampering with evidence. The Saudi legal system maintains the confidentiality of investigations to protect defenda
APA, Harvard, Vancouver, ISO, and other styles
15

Swapna, P., S. Fazila, K. Hanumanthu Naik, G. Amrutha vani, and B. Reddaiah. "Hybrid Cryptosystem Ensuring CIA Triad." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 50–53. http://dx.doi.org/10.35940/ijeat.a3841.1012122.

Full text
Abstract:
Any untoward incident occurs while transmitting data digitally may lead to threats whenever the data is transmitted to malicious destination unknowingly, there arises a question of data integrity. In this scenario cryptography plays a crucial role in ensuring the users both confidentiality and integrity while transmitting of data over various network platform, supporting with the algorithms like AES, hashing etc., to ensure end user safety. In this paper, an improved hybrid cryptography system which is a combination of message digest and symmetric key algorithm is being incorporated. This prop
APA, Harvard, Vancouver, ISO, and other styles
16

P, Swapna, Fazila S, Hanumanthu Naik K, Amrutha vani G, and Reddaiah B. "Hybrid Cryptosystem Ensuring CIA Triad." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 1 (2022): 50–53. https://doi.org/10.35940/ijeat.A3841.1012122.

Full text
Abstract:
<strong>Abstract: </strong>Any untoward incident occurs while transmitting data digitally may lead to threats whenever the data is transmitted to malicious destination unknowingly, there arises a question of data integrity. In this scenario cryptography plays a crucial role in ensuring the users both confidentiality and integrity while transmitting of data over various network platform, supporting with the algorithms like AES, hashing etc., to ensure end user safety. In this paper, an improved hybrid cryptography system which is a combination of message digest and symmetric key algorithm is be
APA, Harvard, Vancouver, ISO, and other styles
17

Hazela, Bramah, Shashi Kant Gupta, Nupur Soni, and Ch Naga Saranya. "Securing the Confidentiality and Integrity of Cloud Computing Data." ECS Transactions 107, no. 1 (2022): 2651–63. http://dx.doi.org/10.1149/10701.2651ecst.

Full text
Abstract:
Cloud Service Providers (CSPs) are becoming increasingly popular as the amount of available digital data continues to grow at an exponential rate. A new set of benefits and economies made possible by cloud technologies in terms of bandwidth, computing, storage, and transmission costs, which will all reduce the overall costs for data storage for the company, which provide customers with convenient and efficient storage services. For the protection of the Cloud Client (CC) data in the cloud, several different security models are available. In order to verify that CSPs and the CC are in complianc
APA, Harvard, Vancouver, ISO, and other styles
18

Chai, Kar Yee, and Mohamad Fadli Zolkipli. "Review on Confidentiality, Integrity and Availability in Information Security." Journal of ICT In Education 8, no. 2 (2021): 34–42. http://dx.doi.org/10.37134/jictie.vol8.2.4.2021.

Full text
Abstract:
Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodolo
APA, Harvard, Vancouver, ISO, and other styles
19

Aminzade, Michael. "Confidentiality, integrity and availability – finding a balanced IT framework." Network Security 2018, no. 5 (2018): 9–11. http://dx.doi.org/10.1016/s1353-4858(18)30043-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rogers, Austin, and Aleksandar Milenković. "Security extensions for integrity and confidentiality in embedded processors." Microprocessors and Microsystems 33, no. 5-6 (2009): 398–414. http://dx.doi.org/10.1016/j.micpro.2009.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Vansuri, Rayhan, Achmad Fauzi, Ery Teguh Prasetyo, et al. "Peran CIA (Confidentiality, Integrity, Availability) Terhadap Manajemen Keamanan Informasi." Jurnal Ilmu Multidisplin 2, no. 1 (2023): 106–13. http://dx.doi.org/10.38035/jim.v2i1.234.

Full text
Abstract:
Dalam hal ini, keamanan informasi merupakan faktor penting yang harus diperhatikan oleh setiap perusahaan. Namun, keamanan informasi seringkali diabaikan atau tidak dianggap serius oleh perusahaan. Beberapa faktor yang menyebabkan hal tersebut adalah kurangnya kesadaran dan pengetahuan tentang keamanan informasi serta kurangnya pelatihan bagi karyawan dalam mengelola informasi dan teknologi. Penelitian ini menggunakan metode studi literatur. Selain itu, penelitian ini juga membahas peran pelatihan dan kesadaran keamanan dalam manajemen keamanan informasi di perusahaan. Hasil penelitian menjela
APA, Harvard, Vancouver, ISO, and other styles
22

Ms, .Chaitali Jadhav. "Providing Confidentiality and Integrity for Data Stored On Cloud." Recent Trends in Cloud Computing and Web Engineering 6, no. 2 (2024): 7–13. https://doi.org/10.5281/zenodo.10780841.

Full text
Abstract:
<em>of data. It uses the Internet for the tasks performed on the computer and it is visualized as the next generation architecture of IT Enterprise. The Cloud represents the Internet. In this , we focus on secure data storage in cloud; it is an important aspect of quality of service. To ensure the correctness of user&lsquo;s data in the cloud, We propose effective and adaptable scheme with salient qualities.</em> <em>This plan accomplishes information capacity accuracy permit the verified client to get to the information and information mistake confinement, I. e. the recognizable proof of acti
APA, Harvard, Vancouver, ISO, and other styles
23

Kumar, Raushan, and Dr Shikha Tiwari. "Network Security and Cryptography: Ensuring Data Integrity and Confidentiality in the Digital Age." International Journal of Research Publication and Reviews 5, no. 7 (2024): 581–86. http://dx.doi.org/10.55248/gengpi.5.0724.1621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ankush, S., and M. S. Vinayprasad. "Enhance Security for Authentication." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 311–15. https://doi.org/10.35940/ijrte.C4429.099320.

Full text
Abstract:
An enhanced security for authentication is defined because it is vital that authentication is an extremely important crucial robust process for each user to access any of the applications. Magnificent growth and usage of the internet raise agitate about the way to communicate, protect data and sensitive information safely. In today&#39;s world hackers use differing types of attacks in order to acquire valuable information. Many of the attacks are primarily used to get into an application to steal the credentials followed by internal information of the users. The first thing of security is defi
APA, Harvard, Vancouver, ISO, and other styles
25

Pratiwi, Leni, and Jan Hoesada. "ANALYSIS OF THE INFLUENCE OF APIP BEHAVIOR PRINCIPLES ON AUDIT QUALITY (STUDY CASE OF THE INSPECTORATE JENDERAL OF THE MINISTRY OF COMMUNICATION AND INFORMATION)." Dinasti International Journal of Management Science 1, no. 5 (2020): 719–31. http://dx.doi.org/10.31933/dijms.v1i5.286.

Full text
Abstract:
The purpose of this study is to obtain empirical evidence about the Analysis of the Effect of the APIP Behavior Principles (Integrity, Objectivity, Confidentiality, and Competence) on Audit Quality. This research was conducted at the Inspectorate General of Communication and Information. The independent variable in this study is the principles of APIP behavior (Integrity, Objectivity, Confidentiality, and Competence), and the dependent variable is Audit quality. The results of this study prove that the principles of APIP behavior affect audit quality.
APA, Harvard, Vancouver, ISO, and other styles
26

Ngo, Tri Minh, and Nhat Vien Duy Nguyen. "Secure Information Flow for IoT Applications." JOIV : International Journal on Informatics Visualization 3, no. 2-2 (2019): 192–97. http://dx.doi.org/10.30630/joiv.3.2.231.

Full text
Abstract:
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes. In addition to errors, many communication channels also cause erasures, i.e., the demodulator cannot decide which symbol the received waveform represents. The paper proposes a method that might correct both errors and erasures together. Our method is efficient in reducing memory storage as well as decoding complexity.
APA, Harvard, Vancouver, ISO, and other styles
27

Arini. "Determinan Kinerja Auditor pada Inspektorat Provinsi Riau." Jurnal Akuntansi, Manajemen, Bisnis dan Teknologi 4, no. 2 (2024): 291–99. https://doi.org/10.56870/ww038836.

Full text
Abstract:
This study aims to determine whether there is Integrity, objectivity, and Confidentiality on Auditor Performance at the Inspectorate of Riau Province. This research will be conducted at the Inspectorate of Riau Province. The research approach uses quantitative with primary data sources. The population and sample are all auditors in the Provincial Inspectorate office. Data analysis using multiple linear regression with SPSS 23. The results of statistical testing show that Integrity, Objectivity, and Confidentiality have a significant effect on Auditor Performance.
APA, Harvard, Vancouver, ISO, and other styles
28

Ahmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.

Full text
Abstract:
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing
APA, Harvard, Vancouver, ISO, and other styles
29

Anthony Anyanwu, Temidayo Olorunsogo, Temitayo Oluwaseun Abrahams, Odunayo Josephine Akindote, and Oluwatosin Reis. "DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS." Computer Science & IT Research Journal 5, no. 1 (2024): 237–53. http://dx.doi.org/10.51594/csitrj.v5i1.735.

Full text
Abstract:
In an era dominated by digital transformation, superannuation organizations face unprecedented challenges in safeguarding the confidentiality and integrity of sensitive financial data. This review explores the intricate relationship between accounting practices and cybersecurity controls within the context of superannuation entities. By examining the existing literature, regulatory frameworks, and industry best practices, this paper synthesizes the key considerations essential for ensuring robust data protection. The study delves into the critical role of accounting systems in managing financi
APA, Harvard, Vancouver, ISO, and other styles
30

Park, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.

Full text
Abstract:
Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are duplicated. Cloud storage service providers can save huge amounts of resources via client-side deduplication. On the other hand, for safe outsourcing, clients who use the cloud storage service desire data integrity and confidentiality of the outsourced data. However, ensuring confidentiality and integrity in the cloud storage environm
APA, Harvard, Vancouver, ISO, and other styles
31

Pontes, Davi, Fernando Silva, Anderson Melo, Eduardo Falcão, and Andrey Brito. "Interoperable node integrity verification for confidential machines based on AMD SEV-SNP." Journal of Internet Services and Applications 15, no. 1 (2024): 179–93. http://dx.doi.org/10.5753/jisa.2024.3905.

Full text
Abstract:
Confidential virtual machines (CVMs) are cloud providers' most recent security offer, providing confidentiality and integrity features. Although confidentiality protects the machine from the host operating system, firmware, and cloud operators, integrity protection is even more useful, enabling protection for a wider range of security issues. Unfortunately, CVM integrity verification depends on remote attestation protocols, which are not trivial for operators and differ largely among cloud providers. We propose an approach for abstracting CVM attestation that leverages an open-source standard,
APA, Harvard, Vancouver, ISO, and other styles
32

Dzelendzyak, Ulyana, and Nazar Mashtaler. "COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY." Measuring Equipment and Metrology 85, no. 3 (2024): 47–53. http://dx.doi.org/10.23939/istcmtm2024.03.047.

Full text
Abstract:
The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications. Availability highlights the necessity of reliable and timely access to data, even in the face of potential system failures or disasters, by implementing safeguards like ba
APA, Harvard, Vancouver, ISO, and other styles
33

R, Kanagavalli, and S. Vagdevi. "SECURED DATA STORAGE IN CLOUD USING HOMOMORPHIC ENCRYPTION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 9, no. 4 (2019): 1–11. https://doi.org/10.5281/zenodo.3426256.

Full text
Abstract:
Cloud data storage is a model of data storage where data in its digital form is stored in logical pools across the physical storage which is distributed across multiple servers usually in diverse locations. The full physical environment is owned and managed by an organization called Cloud Service Provider (CSP). In this type of storage, the data is distributed and owned by third party, and there is risk of unauthorized access. This makes security, reliability, confidentiality and privacy of data more important when storage in cloud is thought of. Although there are methods available for provid
APA, Harvard, Vancouver, ISO, and other styles
34

Thahniyath, Gousia, Priti Mishra, and Sundar Raj Moorthy. "Two phase secure data collection technique for wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 1 (2022): 512–20. https://doi.org/10.11591/ijeecs.v26.i1.pp512-520.

Full text
Abstract:
Wireless sensor networks (WSNs) are the sensors that are dispersed in a different location that can sense the accumulated data in real-time and send it to the central location for the process of data aggregation. During the transfer of the information using the data nodes from the WSNs to the central location, there may be chances that the data node could be compromised by sensor failure or by an attack from a malicious user. To overcome this problem, we propose a two-phase secure data collection (TPSDC) technique for wireless sensor networks which provides confidentiality and integrity for th
APA, Harvard, Vancouver, ISO, and other styles
35

Ayem, Sri, and Didimus Jehadi. "Pengaruh Kode Etik Aparat Pengawasan Intern Pemerintah (Apip) Dan Pengalaman Kerja Auditor Internal Terhadap Kualitas Audit." Jurnal Akuntansi dan Governance Andalas 2, no. 1 (2019): 1–19. http://dx.doi.org/10.25077/jaga.v2i1.17.

Full text
Abstract:
This study aims to determine the effect of integrity, objectivity, confidentiality, competence and work experience on the audit quality of internal auditors in the DIY Representative BPKP, both partially and simultaneously. This study uses primary data obtained from the distribution of questionnaires to respondents. The population in this study were all functional internal auditor officials at the BPKP DIY Representative, with the sampling technique using nonprobability sampling, namely purposive sampling. Purposive sampling is done by taking samples from several populations based on certain c
APA, Harvard, Vancouver, ISO, and other styles
36

BANERJEE, ANINDYA, and DAVID A. NAUMANN. "Stack-based access control and secure information flow." Journal of Functional Programming 15, no. 2 (2005): 131–77. http://dx.doi.org/10.1017/s0956796804005453.

Full text
Abstract:
Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control mechanism in which permissions are granted to program units and a runtime mechanism checks permissions of code in the calling chain. We investigate a design pattern by which this mechanism can be used to achieve confidentiality and integrity goals: a single interface serves callers of more than one securit
APA, Harvard, Vancouver, ISO, and other styles
37

GUO, Yun-Chuan, Bin-Xing FANG, Li-Hua YIN, and Yuan ZHOU. "A Security Model for Confidentiality and Integrity in Mobile Computing." Chinese Journal of Computers 36, no. 7 (2014): 1424–33. http://dx.doi.org/10.3724/sp.j.1016.2013.01424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Yuanyuan, Dawu Gu, Fangyong Hou, Mengqi Zeng, and Tao Cheng. "Architecture Support for Memory Confidentiality and Integrity in Embedded Systems." International Journal of Distributed Sensor Networks 5, no. 1 (2009): 96. http://dx.doi.org/10.1080/15501320802575161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Housley, R. "Authentication, confidentiality, and integrity extensions to the XNS protocol suite." ACM SIGSAC Review 7, no. 3 (1989): 17–24. http://dx.doi.org/10.1145/77308.77312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

von Maurich, Olga, and Alessandro Golkar. "Data authentication, integrity and confidentiality mechanisms for federated satellite systems." Acta Astronautica 149 (August 2018): 61–76. http://dx.doi.org/10.1016/j.actaastro.2018.05.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

C, Nandini, Arpitha Vasudev, Vijay Suprith S, Syed Suhail, Sai Sireesh G T, and Praveen Kumar. "A Study on Cryptographic Algorithms for Data Confidentiality and Integrity." Journal of Cryptography and Network Security, Design and Codes 2, no. 1 (2025): 1–9. https://doi.org/10.46610/jocnsdc.2025.v02i01.001.

Full text
Abstract:
In today’s digital landscape, safeguarding sensitive information during transactions has become increasingly critical. This project focuses on developing a secure data exchange framework by integrating cryptographic techniques, blockchain technology, and steganography. Inspired by blockchain-based asset management systems and decentralized transaction models, the study employs cryptographic methods like SHA-256 hashing, Proof of Work (PoW), and Proof of Stake (PoS) to ensure data integrity, authenticity, and confidentiality. To further enhance security, the project incorporates multimodal steg
APA, Harvard, Vancouver, ISO, and other styles
42

Litvinov, Egor, Henry Llumiguano, Maria J. Santofimia, Xavier del Toro, Felix J. Villanueva, and Pedro Rocha. "Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing." Sensors 23, no. 10 (2023): 4794. http://dx.doi.org/10.3390/s23104794.

Full text
Abstract:
Internet of Things cybersecurity is gaining attention as the number of devices installed in IoT environments is exponentially increasing while the number of attacks successfully addressed to these devices are also proliferating. Security concerns have, however, been mainly addressed to service availability and information integrity and confidentiality. Code integrity, on the other hand, is not receiving proper attention, mainly because of the limited resources of these devices, thus preventing the implementation of advanced protection mechanisms. This situation calls for further research on ho
APA, Harvard, Vancouver, ISO, and other styles
43

Gao, Rui, Zhuang Cai, Jianbang Wang, and Huajie Liu. "Condensed DNA Nanosphere for DNA Origami Cryptography." Chemistry 5, no. 4 (2023): 2406–17. http://dx.doi.org/10.3390/chemistry5040159.

Full text
Abstract:
Maintaining the confidentiality and integrity of the messages during a transmission is one of the most important aims of encrypted communication systems. Many achievements were made using biomolecules to improve the quality of the messages in communication. At the same time, it is still a challenge to construct cooperative communications based on the interactions between biomolecules to achieve the confidentiality and integrity of the transmitted messages. DNA-based encrypted communications have been developed, and in particular, DNA-origami-based message encryption can combine steganography a
APA, Harvard, Vancouver, ISO, and other styles
44

Dhanuskodi, Gobikrishna, Sudeshna Guha, Vidhya Krishnan, et al. "Creating the First Confidential GPUs." Communications of the ACM 67, no. 1 (2023): 60–67. http://dx.doi.org/10.1145/3626827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Banu, S. Saira. "A Review on Data Security in Information Management Using Digitized Technology." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2236–41. https://doi.org/10.22214/ijraset.2024.65610.

Full text
Abstract:
This Paper provides a review on Data Security in information management. In information management systems, ensuring data integrity, confidentiality, and availability is crucial. Data security involves safeguarding information against unauthorized access, loss, confidentiality and availability throughout the cycle. This paper also focuses on the impact of latest technologies such as Cloud Computing, Big data and IoT that are reshaping the landscape of data integrity. The integration of digitized technology in information management offers transformative benefits but necessitates robust data se
APA, Harvard, Vancouver, ISO, and other styles
46

Gabriel, Kofi Armah, Ntiamoah Ofosu Hayford, and Aveyom Valentine. "ENHANCING DATA PRIVACY IN GOVERNMENT ORGANIZATIONS: A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF OPTIMAL CERTIFICATELESS SCHEMES." Engineering and Technology Journal 8, no. 08 (2023): 2665–78. https://doi.org/10.5281/zenodo.8303924.

Full text
Abstract:
The rapid expansion in Technology has transformed our everyday objects into interconnected entities, globally changing connectivity through the Internet and reshaping human interactions with their surroundings. This paradigm shift has occasioned the need for various networked infrastructures to facilitate and improve innovative services as well as enhance the flexibility and efficiency in this human- environment interactivity. However, this digitalization drive has also brought forth a range of security concerns that cannot be neglected. This paper emphasizes on the role of certificateless sys
APA, Harvard, Vancouver, ISO, and other styles
47

Hampiholi, Narayan. "THROUGH THE LENS OF PRINCIPLED DATA PRACTICE A GROUNDBREAKING EXPLORATION INTO ETHICAL HEALTHCARE PLATFORMS." International Journal of Engineering Applied Sciences and Technology 8, no. 5 (2023): 26–30. http://dx.doi.org/10.33564/ijeast.2023.v08i05.004.

Full text
Abstract:
Fundamental Ethical Principles of Data Privacy and Security and how Healthcare Data Platforms Ensure the Confidentiality and Integrity of Patient Information, Safeguarding it Against Unauthorized Access and Cyber Threats. In the last years, there has been a considerable increase in the usage of electronic health records (EHRs). Credit card numbers, full name, bank account numbers, social security numbers, street addresses, phone numbers, passport numbers, treatments, and medical histories are all private patient information that may be found in health information systems. This information must
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Kiran Deep, Prabh Deep Singh, G. L. Saini, and Deepak Panwar. "Privacy-preserving cryptographic solutions for medical image protection : The secure force algorithm and intelligent encryption systems." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 537–46. http://dx.doi.org/10.47974/jdmsc-1926.

Full text
Abstract:
Privacy-preserving must comply with regulatory requirements, safeguard patient privacy, secure data integrity, enable evolving technologies, and guarantee moral and reliable healthcare practices for healthcare applications. By adopting these measures, the healthcare industry may effectively harness the advantages offered by contemporary technology while simultaneously ensuring the protection of patient confidentiality. In this paper, a Secure Force (SF) Encryption Algorithm is modified and improved to guarantee data confidentiality, integrity, and privacy for healthcare applications. Furthermo
APA, Harvard, Vancouver, ISO, and other styles
49

Paulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.

Full text
Abstract:
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography
APA, Harvard, Vancouver, ISO, and other styles
50

Tati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.

Full text
Abstract:
Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!