Journal articles on the topic 'Integrity Confidentiality'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Integrity Confidentiality.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Edgar, Andrew. "Confidentiality and Personal Integrity." Nursing Ethics 1, no. 2 (1994): 86–95. http://dx.doi.org/10.1177/096973309400100204.
Full textCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Full textJain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.
Full textSantos, Tiago, and Carlos Serrão. "Granular Confidentiality and Integrity of JSON Messages." International Journal of Intelligent Computing Research 8, no. 2 (2017): 839–48. http://dx.doi.org/10.20533/ijicr.2042.4655.2017.0103.
Full textRady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and Confidentiality in Cloud Outsourced Data." Ain Shams Engineering Journal 10, no. 2 (2019): 275–85. http://dx.doi.org/10.1016/j.asej.2019.03.002.
Full textGuan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.
Full textJo, Jeong Hoon, Shailendra Rathore, Vincenzo Loia, and Jong Hyuk Park. "A blockchain-based trusted security zone architecture." Electronic Library 37, no. 5 (2019): 796–810. http://dx.doi.org/10.1108/el-02-2019-0053.
Full textGallo, Paul. "Confidentiality and Trial Integrity Issues for Adaptive Designs." Drug Information Journal 40, no. 4 (2006): 445–50. http://dx.doi.org/10.1177/216847900604000410.
Full textPapadopoulos, Stavros, Aggelos Kiayias, and Dimitris Papadias. "Exact In-Network Aggregation with Integrity and Confidentiality." IEEE Transactions on Knowledge and Data Engineering 24, no. 10 (2012): 1760–73. http://dx.doi.org/10.1109/tkde.2012.64.
Full textKarismanda, Agrilia Priska, Lia Rachmawati, and Diana Dwi Astuti. "Pengaruh Integritas, Objektivitas, Kompetensi, Perilaku Profesional dan Kerahasiaan Terhadap Kualitas Audit Dengan Independensi Sebagai Variabel Moderasi (Pada Kantor Inspektorat Kabupaten Jember)." JAKUMA : JURNAL AKUNTANSI DAN MANAJEMEN KEUANGAN 1, no. 2 (2021): 1–25. http://dx.doi.org/10.31967/jakuma.v1i2.404.
Full textH.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Full textChandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654. http://dx.doi.org/10.11591/ijece.v15i1.pp654-668.
Full textChandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654–68. https://doi.org/10.11591/ijece.v15i1.pp654-668.
Full textAli Ibn Abduh Muhammad Osimi Hakami. "Blocking the Pretexts for Investigation Confidentiality in the Saudi Criminal Procedure Code." Journal of Information Systems Engineering and Management 10, no. 40s (2025): 525–33. https://doi.org/10.52783/jisem.v10i40s.7323.
Full textSwapna, P., S. Fazila, K. Hanumanthu Naik, G. Amrutha vani, and B. Reddaiah. "Hybrid Cryptosystem Ensuring CIA Triad." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 50–53. http://dx.doi.org/10.35940/ijeat.a3841.1012122.
Full textP, Swapna, Fazila S, Hanumanthu Naik K, Amrutha vani G, and Reddaiah B. "Hybrid Cryptosystem Ensuring CIA Triad." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 1 (2022): 50–53. https://doi.org/10.35940/ijeat.A3841.1012122.
Full textHazela, Bramah, Shashi Kant Gupta, Nupur Soni, and Ch Naga Saranya. "Securing the Confidentiality and Integrity of Cloud Computing Data." ECS Transactions 107, no. 1 (2022): 2651–63. http://dx.doi.org/10.1149/10701.2651ecst.
Full textChai, Kar Yee, and Mohamad Fadli Zolkipli. "Review on Confidentiality, Integrity and Availability in Information Security." Journal of ICT In Education 8, no. 2 (2021): 34–42. http://dx.doi.org/10.37134/jictie.vol8.2.4.2021.
Full textAminzade, Michael. "Confidentiality, integrity and availability – finding a balanced IT framework." Network Security 2018, no. 5 (2018): 9–11. http://dx.doi.org/10.1016/s1353-4858(18)30043-6.
Full textRogers, Austin, and Aleksandar Milenković. "Security extensions for integrity and confidentiality in embedded processors." Microprocessors and Microsystems 33, no. 5-6 (2009): 398–414. http://dx.doi.org/10.1016/j.micpro.2009.06.002.
Full textVansuri, Rayhan, Achmad Fauzi, Ery Teguh Prasetyo, et al. "Peran CIA (Confidentiality, Integrity, Availability) Terhadap Manajemen Keamanan Informasi." Jurnal Ilmu Multidisplin 2, no. 1 (2023): 106–13. http://dx.doi.org/10.38035/jim.v2i1.234.
Full textMs, .Chaitali Jadhav. "Providing Confidentiality and Integrity for Data Stored On Cloud." Recent Trends in Cloud Computing and Web Engineering 6, no. 2 (2024): 7–13. https://doi.org/10.5281/zenodo.10780841.
Full textKumar, Raushan, and Dr Shikha Tiwari. "Network Security and Cryptography: Ensuring Data Integrity and Confidentiality in the Digital Age." International Journal of Research Publication and Reviews 5, no. 7 (2024): 581–86. http://dx.doi.org/10.55248/gengpi.5.0724.1621.
Full textAnkush, S., and M. S. Vinayprasad. "Enhance Security for Authentication." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 311–15. https://doi.org/10.35940/ijrte.C4429.099320.
Full textPratiwi, Leni, and Jan Hoesada. "ANALYSIS OF THE INFLUENCE OF APIP BEHAVIOR PRINCIPLES ON AUDIT QUALITY (STUDY CASE OF THE INSPECTORATE JENDERAL OF THE MINISTRY OF COMMUNICATION AND INFORMATION)." Dinasti International Journal of Management Science 1, no. 5 (2020): 719–31. http://dx.doi.org/10.31933/dijms.v1i5.286.
Full textNgo, Tri Minh, and Nhat Vien Duy Nguyen. "Secure Information Flow for IoT Applications." JOIV : International Journal on Informatics Visualization 3, no. 2-2 (2019): 192–97. http://dx.doi.org/10.30630/joiv.3.2.231.
Full textArini. "Determinan Kinerja Auditor pada Inspektorat Provinsi Riau." Jurnal Akuntansi, Manajemen, Bisnis dan Teknologi 4, no. 2 (2024): 291–99. https://doi.org/10.56870/ww038836.
Full textAhmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.
Full textAnthony Anyanwu, Temidayo Olorunsogo, Temitayo Oluwaseun Abrahams, Odunayo Josephine Akindote, and Oluwatosin Reis. "DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS." Computer Science & IT Research Journal 5, no. 1 (2024): 237–53. http://dx.doi.org/10.51594/csitrj.v5i1.735.
Full textPark, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.
Full textPontes, Davi, Fernando Silva, Anderson Melo, Eduardo Falcão, and Andrey Brito. "Interoperable node integrity verification for confidential machines based on AMD SEV-SNP." Journal of Internet Services and Applications 15, no. 1 (2024): 179–93. http://dx.doi.org/10.5753/jisa.2024.3905.
Full textDzelendzyak, Ulyana, and Nazar Mashtaler. "COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY." Measuring Equipment and Metrology 85, no. 3 (2024): 47–53. http://dx.doi.org/10.23939/istcmtm2024.03.047.
Full textR, Kanagavalli, and S. Vagdevi. "SECURED DATA STORAGE IN CLOUD USING HOMOMORPHIC ENCRYPTION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 9, no. 4 (2019): 1–11. https://doi.org/10.5281/zenodo.3426256.
Full textThahniyath, Gousia, Priti Mishra, and Sundar Raj Moorthy. "Two phase secure data collection technique for wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 1 (2022): 512–20. https://doi.org/10.11591/ijeecs.v26.i1.pp512-520.
Full textAyem, Sri, and Didimus Jehadi. "Pengaruh Kode Etik Aparat Pengawasan Intern Pemerintah (Apip) Dan Pengalaman Kerja Auditor Internal Terhadap Kualitas Audit." Jurnal Akuntansi dan Governance Andalas 2, no. 1 (2019): 1–19. http://dx.doi.org/10.25077/jaga.v2i1.17.
Full textBANERJEE, ANINDYA, and DAVID A. NAUMANN. "Stack-based access control and secure information flow." Journal of Functional Programming 15, no. 2 (2005): 131–77. http://dx.doi.org/10.1017/s0956796804005453.
Full textGUO, Yun-Chuan, Bin-Xing FANG, Li-Hua YIN, and Yuan ZHOU. "A Security Model for Confidentiality and Integrity in Mobile Computing." Chinese Journal of Computers 36, no. 7 (2014): 1424–33. http://dx.doi.org/10.3724/sp.j.1016.2013.01424.
Full textZhang, Yuanyuan, Dawu Gu, Fangyong Hou, Mengqi Zeng, and Tao Cheng. "Architecture Support for Memory Confidentiality and Integrity in Embedded Systems." International Journal of Distributed Sensor Networks 5, no. 1 (2009): 96. http://dx.doi.org/10.1080/15501320802575161.
Full textHousley, R. "Authentication, confidentiality, and integrity extensions to the XNS protocol suite." ACM SIGSAC Review 7, no. 3 (1989): 17–24. http://dx.doi.org/10.1145/77308.77312.
Full textvon Maurich, Olga, and Alessandro Golkar. "Data authentication, integrity and confidentiality mechanisms for federated satellite systems." Acta Astronautica 149 (August 2018): 61–76. http://dx.doi.org/10.1016/j.actaastro.2018.05.003.
Full textC, Nandini, Arpitha Vasudev, Vijay Suprith S, Syed Suhail, Sai Sireesh G T, and Praveen Kumar. "A Study on Cryptographic Algorithms for Data Confidentiality and Integrity." Journal of Cryptography and Network Security, Design and Codes 2, no. 1 (2025): 1–9. https://doi.org/10.46610/jocnsdc.2025.v02i01.001.
Full textLitvinov, Egor, Henry Llumiguano, Maria J. Santofimia, Xavier del Toro, Felix J. Villanueva, and Pedro Rocha. "Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing." Sensors 23, no. 10 (2023): 4794. http://dx.doi.org/10.3390/s23104794.
Full textGao, Rui, Zhuang Cai, Jianbang Wang, and Huajie Liu. "Condensed DNA Nanosphere for DNA Origami Cryptography." Chemistry 5, no. 4 (2023): 2406–17. http://dx.doi.org/10.3390/chemistry5040159.
Full textDhanuskodi, Gobikrishna, Sudeshna Guha, Vidhya Krishnan, et al. "Creating the First Confidential GPUs." Communications of the ACM 67, no. 1 (2023): 60–67. http://dx.doi.org/10.1145/3626827.
Full textBanu, S. Saira. "A Review on Data Security in Information Management Using Digitized Technology." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2236–41. https://doi.org/10.22214/ijraset.2024.65610.
Full textGabriel, Kofi Armah, Ntiamoah Ofosu Hayford, and Aveyom Valentine. "ENHANCING DATA PRIVACY IN GOVERNMENT ORGANIZATIONS: A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF OPTIMAL CERTIFICATELESS SCHEMES." Engineering and Technology Journal 8, no. 08 (2023): 2665–78. https://doi.org/10.5281/zenodo.8303924.
Full textHampiholi, Narayan. "THROUGH THE LENS OF PRINCIPLED DATA PRACTICE A GROUNDBREAKING EXPLORATION INTO ETHICAL HEALTHCARE PLATFORMS." International Journal of Engineering Applied Sciences and Technology 8, no. 5 (2023): 26–30. http://dx.doi.org/10.33564/ijeast.2023.v08i05.004.
Full textSingh, Kiran Deep, Prabh Deep Singh, G. L. Saini, and Deepak Panwar. "Privacy-preserving cryptographic solutions for medical image protection : The secure force algorithm and intelligent encryption systems." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 537–46. http://dx.doi.org/10.47974/jdmsc-1926.
Full textPaulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.
Full textTati Ernawati and Fikri Faiz Fadhlur Rachmat. "Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 180–86. http://dx.doi.org/10.29207/resti.v5i1.2825.
Full text