Academic literature on the topic 'Support secure data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Support secure data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Support secure data processing"
Sun, Yan, and Shambhu Upadhyaya. "Secure and privacy preserving data processing support for active authentication." Information Systems Frontiers 17, no. 5 (July 29, 2015): 1007–15. http://dx.doi.org/10.1007/s10796-015-9587-9.
Full textJariwala, Vivaksha, Himanshu Patel, Parth Patel, and Devesh C. Jinwala. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." International Journal of Distributed Systems and Technologies 5, no. 3 (July 2014): 77–99. http://dx.doi.org/10.4018/ijdst.2014070104.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textMarwan, Mbarek, Ali Karti, and Hassan Ouahmane. "Proposal for a Secure Data Sharing and Processing in Cloud Applications for Healthcare Domain." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 1 (January 31, 2021): 10–17. http://dx.doi.org/10.52502/ijitas.v3i1.15.
Full textAlenezi, Mamdouh, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan. "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 14–31. http://dx.doi.org/10.4018/ijisp.2019040102.
Full textHamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, and Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms." Entropy 24, no. 4 (April 6, 2022): 519. http://dx.doi.org/10.3390/e24040519.
Full textAlsaig, Alaa, Vangalur Alagar, Zaki Chammaa, and Nematollaah Shiri. "Characterization and Efficient Management of Big Data in IoT-Driven Smart City Development." Sensors 19, no. 11 (May 28, 2019): 2430. http://dx.doi.org/10.3390/s19112430.
Full textMeister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (September 9, 2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.
Full textSánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Full textDissertations / Theses on the topic "Support secure data processing"
Найда, Андрій Олегович. "Адаптивний механізм управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/35934.
Full textThesis: 66 p.,8 fig., 12 Table., 2 Appendix, 7 j. Object of study - Adaptive security management mechanisms to support secure data processing in distributed computer systems Software product - a simulation program for determining encryption and message processing, programming language - C ++. The purpose of the work is to investigate the methods of implementation of adaptive control systems. Research method - study of literature and other information sources on this topic, analysis of existing methods of adaptive management mechanisms.
Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.
Full textWang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.
Full textBeckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Full textMutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.
Full textTitle from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Iwaya, Leonardo H. "Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-46982.
Full textInformation security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance.
Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.
Full textRamachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.
Full textMxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.
Full textKordale, Rammohan. "System support for scalable services." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8246.
Full textBooks on the topic "Support secure data processing"
Marsh, David. Project support office: Or, project support assistant. London: Stationery Office, 2001.
Find full textAtluri, Vijay. Multilevel secure transaction processing. Boston: Kluwer Academic, 2000.
Find full textWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Find full textHale, Mark P. Implementing computing support centers. McKinney, Tex: Academic Computing Publications, 1989.
Find full textHodge, Gail M. Computer support to indexing. Philadelphia: National Federation of Abstracting and Information Services, 1998.
Find full textWallis, Louis A. Computer-based sales force support. New York, NY: Conference Board, 1990.
Find full textGuariso, Giorgio. Environmental decision support systems. Chichester [England]: E. Horwood, 1989.
Find full textImproving planning support: The use of planning support systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, Faculteit Geowetenschappen Universiteit Utrecht, 2006.
Find full textVonk, Guido A. Improving planning support: The use of Planning Support Systems for spatial planning. Utrecht: Koninklijk Nederlands Aardrijkskundig Genootschap, 2004.
Find full textUnited States. Internal Revenue Service. Operations support branch glossaries. [Washington, D.C.?]: Internal Revenue Service, 1987.
Find full textBook chapters on the topic "Support secure data processing"
Thuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Adversarial Support Vector Machine Learning." In Secure Data Science, 175–94. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-18.
Full textAdaikkalavan, Raman, Indrakshi Ray, and Xing Xie. "Multilevel Secure Data Stream Processing." In Lecture Notes in Computer Science, 122–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22348-8_11.
Full textMinowa, Tadashi, and Takeshi Takahashi. "Secure Distributed Storage for Bulk Data." In Neural Information Processing, 566–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_67.
Full textThuraisngham, Bhavani, Murat Kantarcioglu, and Latifur Khan. "Secure Cloud Query Processing Based on Access Control for Big Data Systems." In Secure Data Science, 267–93. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003081845-26.
Full textKokemüller, Jochen, Heiko Roßnagel, and Anette Weisbecker. "Secure Mobile Support of Independent Sales Agencies." In Lecture Notes in Business Information Processing, 169–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03132-8_14.
Full textMann, Zoltán Ádám, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, and Paul Mundt. "Secure Data Processing in the Cloud." In Communications in Computer and Information Science, 149–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79090-9_10.
Full textMine, Tsunenori, Kosaku Kimura, Satoshi Amamiya, Ken’ichi Takahashi, and Makoto Amamiya. "Agent-Community-Network-Based Secure Collaboration Support System." In Lecture Notes in Business Information Processing, 234–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01668-4_13.
Full textSompolinsky, Yonatan, and Aviv Zohar. "Secure High-Rate Transaction Processing in Bitcoin." In Financial Cryptography and Data Security, 507–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_32.
Full textWelzer, Tatjana, Marko Hölbl, Marjan Družovec, Brane Klopčič, Boštjan Brumen, Hannu Jaakkola, and Mirjam Bonačić. "Medical Personal Data in Secure Information Systems." In Lecture Notes in Business Information Processing, 340–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01112-2_35.
Full textChavarría-Miranda, Daniel, John Mellor-Crummey, and Trushar Sarang. "Data-Parallel Compiler Support for Multipartitioning." In Euro-Par 2001 Parallel Processing, 241–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44681-8_36.
Full textConference papers on the topic "Support secure data processing"
Concepcion Leon, Adrian, and Markus Endler. "Secure distributed ledgers to support IoT technologies data." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7356.
Full textChen, Hao, Lin Chen, Xiaoyun Kuang, Aidong Xu, and Yiwei Yang. "Support Forward Secure Smart Grid Data Deduplication and Deletion Mechanism." In 2021 2nd Asia Symposium on Signal Processing (ASSP). IEEE, 2021. http://dx.doi.org/10.1109/assp54407.2021.00019.
Full textTsai, Hanchung, Yung Y. Liu, and James Shuler. "RFID Technology for Environmental Remediation and Radioactive Waste Management." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40218.
Full textLi, Xinning, and Zhiping Zhou. "Secure support vector machines with data perturbation." In 2018 Chinese Control And Decision Conference (CCDC). IEEE, 2018. http://dx.doi.org/10.1109/ccdc.2018.8407306.
Full textPanaretou, Ioannis, Stavros Hadjithephanous, Corinne Kassapoglou-Faist, Philippe Dallemange, Sofia Louloudi, Dimitrios Karadimas, Christos Panagiotou, Charalampos Kostopoulos, Konstantinos Michail, and Anastasis Kounoudes. "OffshoreMuster: An Integrated Real Time Localisation, Mustering and Evacuation Management System for Offshore Oil & Gas Health and Safety Operations." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/207661-ms.
Full textZhu, Yan, Di Ma, and Shanbiao Wang. "Secure Data Retrieval of Outsourced Data with Complex Query Support." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.91.
Full textMao, Shufu, and Tilman Wolf. "Hardware Support for Secure Processing in Embedded Systems." In 2007 44th ACM/IEEE Design Automation Conference. IEEE, 2007. http://dx.doi.org/10.1109/dac.2007.375213.
Full textMao, Shufu, and Tilman Wolf. "Hardware support for secure processing in embedded systems." In the 44th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1278480.1278605.
Full textPatil, Sangram Damodar, Pradip S. Bhendwade, and R. T. Patil. "Steganographic secure data communication." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949985.
Full textHadole, Pragati, and Vidya Dhamdhere. "Secure decision support system for healthcare professionals." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389517.
Full textReports on the topic "Support secure data processing"
Washington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, July 1997. http://dx.doi.org/10.21236/ada327808.
Full textWashington, William N. Outsourcing Automatic Data Processing Requirements and Support. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada372857.
Full textSchwan, Karsten. Runtime System for I/O Staging in Support of In-Situ Processing of Extreme Scale Data. Office of Scientific and Technical Information (OSTI), November 2013. http://dx.doi.org/10.2172/1164268.
Full textDodge, D. Report on a new architecture to support integration and processing of seismic data from heterogeneous sources. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1658693.
Full textZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/289435.
Full textBigl, Matthew, Caitlin Callaghan, Brandon Booker, Kathryn Trubac, Jacqueline Willan, Paulina Lintsai, and Marissa Torres. Energy Atlas—mapping energy-related data for DoD lands in Alaska : Phase 2—data expansion and portal development. Engineer Research and Development Center (U.S.), January 2022. http://dx.doi.org/10.21079/11681/43062.
Full textZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase II: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289436.
Full textZelt, B. C. Collation and processing of seismic refraction data in support of crustal seismic refraction surveys in the northern Yukon-Mackenzie Delta, phase III: final report. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/289437.
Full textLasko, Kristofer, and Sean Griffin. Monitoring Ecological Restoration with Imagery Tools (MERIT) : Python-based decision support tools integrated into ArcGIS for satellite and UAS image processing, analysis, and classification. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40262.
Full textJasper, Paul. How can new technology support better measurement of extreme poverty? Data and Evidence to End Extreme Poverty, July 2021. http://dx.doi.org/10.55158/deepwpr1.
Full text