Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Transparent Data Encryption (TDE).

Artykuły w czasopismach na temat „Transparent Data Encryption (TDE)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Transparent Data Encryption (TDE)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.

Pełny tekst źródła
Streszczenie:
The Transparent Data Encryption feature was announced in Oracle 10g Database Release 2 to simplify the encryption of data within datafiles, tables stopping access to it from the operating system. Tablespace encryption extends this technology, allowing encryption of the entire insides of a tablespace and tables. Vijay Kumar Tiwari "About Oracle TDE (Transparent Data Encryption)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29814.pdf
Style APA, Harvard, Vancouver, ISO itp.
2

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Pełny tekst źródła
Streszczenie:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
Style APA, Harvard, Vancouver, ISO itp.
3

Beley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.

Pełny tekst źródła
Streszczenie:
The main principles of data security and access organization in the Microsoft Azure cloud storage are considered. A role of hierarchy and access keys are presented. We describe the setup and the use of their keys (BYOK) for transparent data encryption (TDE) using Azure Key Vault keyring.
Style APA, Harvard, Vancouver, ISO itp.
4

Sirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.

Pełny tekst źródła
Streszczenie:
Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data and also the data security will be an
Style APA, Harvard, Vancouver, ISO itp.
5

Researcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.

Pełny tekst źródła
Streszczenie:
This paper provides a detailed review of recent advancements in cloud infrastructure automation, artificial intelligence (AI) applications in cybersecurity, and advanced IPTV technologies, highlighting their transformative roles in digital innovation. Key areas explored include Terraform’s capabilities in Infrastructure as Code (IaC), which significantly enhance automation in cloud environments, alongside AI-driven security protocols that fortify threat detection and response mechanisms. Furthermore, the paper examines Very Large Scale Integration (VLSI) implementations in IPTV for optim
Style APA, Harvard, Vancouver, ISO itp.
6

Sibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.

Pełny tekst źródła
Streszczenie:
<strong>Abstract-</strong> Database security has gained wide notoriety among many individuals worldwide due to the increase in publicized incidents of the loss of or unauthorized exposure to sensitive or confidential data from major corporations, government agencies, and academic institutions. The amount of data collected, retained, and shared electronically by many institutions is steadily increasing. Consequently, the need for individuals to understand the issues, challenges, and available solutions of database security is being realized. At its core, database security strives to ensure that
Style APA, Harvard, Vancouver, ISO itp.
7

Kaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.

Pełny tekst źródła
Streszczenie:
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presen
Style APA, Harvard, Vancouver, ISO itp.
8

Alohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.

Pełny tekst źródła
Streszczenie:
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major
Style APA, Harvard, Vancouver, ISO itp.
9

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.

Pełny tekst źródła
Streszczenie:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
Style APA, Harvard, Vancouver, ISO itp.
10

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.

Pełny tekst źródła
Streszczenie:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
Style APA, Harvard, Vancouver, ISO itp.
11

Maurya, Arvind Kumar, Avinash Singh, Unnati Dubey, and Shivansh Pandey and Upendra Nath Tripathi. "Protection of Data Stored in Transparent Database System using Encryption." Journal of Computer and Mathematical Sciences 10, no. 1 (2019): 190–96. http://dx.doi.org/10.29055/jcms/992.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Jackson, Jennifer, Minmin Jiang, and David Oswald. "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 268–92. https://doi.org/10.46586/tches.v2025.i2.268-292.

Pełny tekst źródła
Streszczenie:
Capability architectures such as CHERI (Capability Hardware Enhanced RISC Instructions) are an emerging technology designed to provide memory safety protection at the hardware level and are equipped to eradicate approximately 70% of the current software vulnerability attack surface. CHERI is an instruction set architecture extension and has been applied to a small number of processors, including various versions of RISC-V. One of the benefits of CHERI is that it inherently provides segregation or compartmentalisation of software, making it suitable for supporting other types of applications su
Style APA, Harvard, Vancouver, ISO itp.
13

Naz, Muqaddas, Fahad A. Al-zahrani, Rabiya Khalid, et al. "A Secure Data Sharing Platform Using Blockchain and Interplanetary File System." Sustainability 11, no. 24 (2019): 7054. http://dx.doi.org/10.3390/su11247054.

Pełny tekst źródła
Streszczenie:
In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access
Style APA, Harvard, Vancouver, ISO itp.
14

Han, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.

Pełny tekst źródła
Streszczenie:
Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the computing processes that are executed on the server to the decentralized and transparent blockchain system, which eliminates the potential threat of malicious servers invading data. Recently, although some of the blockchain-enabled searchable encryption schemes realized that users can search freely and verify search results, unfortunately, these schemes were inefficient and costly. Motivated by this, we proposed a
Style APA, Harvard, Vancouver, ISO itp.
15

Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.

Pełny tekst źródła
Streszczenie:
The design of the "two-way ID authentication and hardware encryption-based secure mobile hard disk" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; th
Style APA, Harvard, Vancouver, ISO itp.
16

Maharani, Herliana Wahyu. "Application of Blockchain Technology for Digital Transaction Security on Business Incubator Websites." Conference Series 2, no. 11 (2020): 8–14. http://dx.doi.org/10.34306/conferenceseries.v2i11.328.

Pełny tekst źródła
Streszczenie:
The application of Blockchain technology in the context of providing security for transactions in the digital era 4.0 to prevent manipulation of transaction recording reports by irresponsible parties. By using research methods 10 (ten) literature reviews and methods of formulating problems, designing research, collecting data, processing &amp; presenting data, analysis &amp; research reports are expected to solve security problems in transactions. At present security in transactions is still very minimal, therefore a blockchain technology is needed to secure transactions where data can still b
Style APA, Harvard, Vancouver, ISO itp.
17

Dliyanti, Aulia. "Creative Economy of College Student Gamification based on E-Commerce." Conference Series 2, no. 11 (2020): 22–30. http://dx.doi.org/10.34306/conferenceseries.v2i11.330.

Pełny tekst źródła
Streszczenie:
The application of Blockchain technology in the context of providing security for transactions in the digital era 4.0 to prevent manipulation of transaction recording reports by irresponsible parties. By using research methods 10 (ten) literature reviews and methods of formulating problems, designing research, collecting data, processing &amp; presenting data, analysis &amp; research reports are expected to solve security problems in transactions. At present security in transactions is still very minimal, therefore a blockchain technology is needed to secure transactions where data can still b
Style APA, Harvard, Vancouver, ISO itp.
18

Xu, Yong Kang, Zheng Jing Wan, Ji Lan Zhang, and Jia Ju Wu. "Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database." Applied Mechanics and Materials 571-572 (June 2014): 591–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.591.

Pełny tekst źródła
Streszczenie:
As the relational database is applied widely, how to protect the sensitive data and state secrets has become a problem which needs to be solved urgently. The conventional relational database encryption technology not only reduces the system’s performance, but also results that we can not quickly inquire the encryption data through the original index mechanism due to the loss of the original partial order relation among data. This paper proposes a kind of relational database encryption technology based on the main memory database. It has not only realized the transparent encryption, decryption
Style APA, Harvard, Vancouver, ISO itp.
19

Munish Saran,. "A Secure Framework based on Sensor-Cloud architecture for Healthcare data using enhanced Elliptic Curve Encryption." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 37–49. https://doi.org/10.52783/cana.v32.3836.

Pełny tekst źródła
Streszczenie:
Healthcare data security is of utmost importance in today's era due to the several reasons such as Privacy Protection, Legal and Regulatory Compliance, Protection against Data Breaches and Cyber Attacks, Patient’s Safety and Continuity of Care, Research and Innovation, Trust and Patient’s Confidence. There must be a security authority deployed that can provide efficient as well as transparent defence mechanism. Traditional technique makes use of access control lists which allows the provision for coarse-grained access to data. Whereas the proposed approach makes use of Attribute-Based Encrypti
Style APA, Harvard, Vancouver, ISO itp.
20

Bamigbade, Oluwatobi. "Balancing Encryption Laws and National Security: Challenges for Data and Energy Sector Collaboration across Borders." Journal of Engineering Research and Reports 27, no. 6 (2025): 193–213. https://doi.org/10.9734/jerr/2025/v27i61538.

Pełny tekst źródła
Streszczenie:
This study examines the intersection of encryption governance and cross-border collaboration in the energy sector through a multidimensional quantitative approach. Publicly available datasets—including the ITU Global Cybersecurity Index, the World Economic Forum’s Global Risks Report, the Belfer National Cyber Power Index, and ENISA’s Threat Landscape Reports—were analyzed using Principal Component Analysis, Ordinal Logistic Regression, Multiple Linear Regression, and ARIMA time-series modeling. Results show that countries with harmonized encryption policies, such as Germany and the United Kin
Style APA, Harvard, Vancouver, ISO itp.
21

Didi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.

Pełny tekst źródła
Streszczenie:
Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-KimKim-Son (CKKS)
Style APA, Harvard, Vancouver, ISO itp.
22

Rosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.

Pełny tekst źródła
Streszczenie:
&lt;p&gt;Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-Kim-Kim-
Style APA, Harvard, Vancouver, ISO itp.
23

Gao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.

Pełny tekst źródła
Streszczenie:
Internal auditing demands innovative and secure solutions in today’s business environment, with increasing competitive pressure and frequent occurrences of risky and illegal behaviours. Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. Hence integrating blockchain with homomorphic encryption and multi-factor authentication improves privacy and mitigates computational overhead. Recently, blockchain applications for internal audits in the enterprise sector are still emerging. Thus, blockchain technology in auditing prov
Style APA, Harvard, Vancouver, ISO itp.
24

Al Jaoufi, Mohammed Ahmed Ahmed, Yun Liu, and Zhen Jiang Zhang. "A Safe and Transparent Sensor Network Data Aggregation (STDA) Program." Advanced Materials Research 1079-1080 (December 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.591.

Pełny tekst źródła
Streszczenie:
In recent years, with the rapid development of the era economy and ever-changing science and technology, today's era information gradually moving towards a diversified network communication. Sensor networks data aggregation mainly gradually reduce redundant transmission and reduce energy consumption to the maximum extent. Currently sensor network data aggregation scheme as an important form of information transmission, is widely used in all kinds of data transmission. This sink node comprehensively checks and compares data and also ensure its secure transmission of data. In the process of rese
Style APA, Harvard, Vancouver, ISO itp.
25

Ahmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.

Pełny tekst źródła
Streszczenie:
E-government is the use of information and communication technology for public service provision in governance. Nowadays, E-government facilitates transparent, accountable, efficient and all-inclusive governing process for improved service delivery to citizens. However, the emergence of this novel innovation opened up new security vulnerabilities to citizens’ data. Comprehensive security plan for secure linkage of people, process and technology is crucial to ensure that data and network channel is protected from potential security threats. The purpose of this study is to provide a security mod
Style APA, Harvard, Vancouver, ISO itp.
26

Keenan, Bernard. "State access to encrypted data in the United Kingdom: The ‘transparent’ approach." Common Law World Review 49, no. 3-4 (2019): 223–44. http://dx.doi.org/10.1177/1473779519892641.

Pełny tekst źródła
Streszczenie:
This article foregrounds four key powers through which the UK intelligence and police agencies (broadly referred to hereafter as ‘law enforcement’) may access encrypted communications and data. It is structured as follows. First, a brief overview of the European Court of Human Rights’ jurisprudence on communications surveillance contextualises the overarching normative framework that must be translated into domestic law. The four powers are then discussed, both in legal and practical terms. The first two powers operate covertly, without the knowledge of the target. The latter two operate coerc
Style APA, Harvard, Vancouver, ISO itp.
27

Siva, Krishna Jampani. "AI and Blockchain Integration for Enhanced Cloud Storage Security and Encryption." European Journal of Advances in Engineering and Technology 8, no. 3 (2021): 92–98. https://doi.org/10.5281/zenodo.14637332.

Pełny tekst źródła
Streszczenie:
The combination of Artificial Intelligence and Blockchain creates a new level of cloud storage security by creating advanced mechanisms for encryption, verification, and threat detection. Artificial intelligence serves as the first layer in proactively securing blockchain transactions through real-time monitoring of potentially vulnerable or malicious activities since blockchain keeps a record of how every encryption key used is being logged in an immutable fashion. Data integrity, privacy, and unauthorized access are some of the critical challenges in cloud storage that will be addressed by t
Style APA, Harvard, Vancouver, ISO itp.
28

Khashan, Osama A., Nour M. Khafajah, Waleed Alomoush, et al. "Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors." Cryptography 7, no. 1 (2023): 12. http://dx.doi.org/10.3390/cryptography7010012.

Pełny tekst źródła
Streszczenie:
Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and slow response speeds. They also suffer from limited flexibility and usability from the user side, owing to continuous routine interactions. Dynamic encryption file systems can mitigate the negative effects of conventional encryption applications by automatically handling all encryption operations with minimal user input and a higher security level. However, m
Style APA, Harvard, Vancouver, ISO itp.
29

Ch. Jyothi, Gaddam Udaya Sri, Manya Madhuri, Beena Kumari, and P. Udhay Kiran. "SECUREFILECHAIN: A BIOMETRIC-DRIVEN AND CHACHA ENHANCED FRAMEWORK FOR PRIVACY-PRESERVING DATA SHARING IN CYBER-PHYSICAL-SOCIAL SYSTEMS." International Journal of Engineering Research and Science & Technology 21, no. 3 (1) (2025): 608–15. https://doi.org/10.62643/ijerst.v21.n3(1).pp608-615.

Pełny tekst źródła
Streszczenie:
This research presents a secure, biometric‐enabled file‐sharing platform that combines Elliptic Curve Integrated Encryption Scheme (ECIES) with ChaCha20 symmetric encryption to balance confidentiality and performance. Users register by submitting a SHA‐256–hashed username, plaintext password, and a fingerprint image (also hashed). On login, biometric verification ensures that only legitimate users gain access. When a file is uploaded, ECIES encrypts the content under the registered user’s public key, producing ciphertext stored in a protected static directory. Simultaneously, ChaCha20 encrypti
Style APA, Harvard, Vancouver, ISO itp.
30

Iqbal, Ahmed, and Irfan Alam Fahim. "Integrity verification for an optimized cloud architecture." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 166–73. https://doi.org/10.12928/TELKOMNIKA.v18i1.14105.

Pełny tekst źródła
Streszczenie:
Cloud computing has significantly benefited today&rsquo;s environment of IT industry through its mobility, sustainability, security, cost savings and several other important features. The risk of data loss on cloud in case of dealing with hardware and software is relatively small. However, the issue of data security becomes imminent when we are storing personal data on the cloud which is not transparent to users. In this paper, we introduce a new entity in terms of a virtual machine that provides services and assurance beyond service level agreement (SLA). In the proposed model, a role of data
Style APA, Harvard, Vancouver, ISO itp.
31

Amoruso, Edward L., Richard Leinecker, and Cliff C. Zou. "User Privacy Protection via Windows Registry Hooking and Runtime Encryption." Sensors 24, no. 16 (2024): 5106. http://dx.doi.org/10.3390/s24165106.

Pełny tekst źródła
Streszczenie:
The Windows registry contains a plethora of information in a hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files and maintains timestamps that can be used to construct a detailed timeline of user activities. However, these data are unencrypted and thus vulnerable to exploitation by malicious actors who gain access to this repository. To address this security and privacy concern, we propose a novel approach that efficiently encrypts and decrypts sensitive registry data in real time. Our developed proof-of-concept program int
Style APA, Harvard, Vancouver, ISO itp.
32

Puchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard." Entropy 23, no. 4 (2021): 421. http://dx.doi.org/10.3390/e23040421.

Pełny tekst źródła
Streszczenie:
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryption process takes advantage of fast linear transforms parametrized with private keys and is carried out prior to the compression stage in a way that does not alter those statistical characteristics of the input image that are crucial from the point of view of the subsequent compression. This feature makes the encryption process transparent to the com
Style APA, Harvard, Vancouver, ISO itp.
33

Benaich, Rihab, Saida El Mendili, and Youssef Gahi. "Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records." HighTech and Innovation Journal 4, no. 3 (2023): 630–52. http://dx.doi.org/10.28991/hij-2023-04-03-012.

Pełny tekst źródła
Streszczenie:
The effective management of electronic health records (EHRs) is vital in healthcare. However, traditional systems often need help handling data inconsistently, providing limited access, and coordinating poorly across facilities. This study aims to tackle these issues using blockchain technology to improve EHR systems' data security, privacy, and interoperability. By thoroughly analyzing blockchain's applications in healthcare, we propose an innovative solution that leverages blockchain's decentralized and immutable nature, combined with advanced encryption techniques such as the Advanced Encry
Style APA, Harvard, Vancouver, ISO itp.
34

Elbarbary, Enas, Ghada Abdelhady, Hussam Elbehiery, and Abdelhalim Zekry. "Secured Transparent Computerized Voting System performance measurements." International Journal of Engineering & Technology 4, no. 2 (2015): 327. http://dx.doi.org/10.14419/ijet.v4i2.4441.

Pełny tekst źródła
Streszczenie:
In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the same time, e.g., presidential, parliamentary, local, amongst others. STCVS's design warrants well-secured identification and authentication processes for the voter via using voter's digital signatures, certificates. Also, it guarantees voting data protection via encryption. Tallying of the voting counts is achieved automatically; candidates recorded percentage
Style APA, Harvard, Vancouver, ISO itp.
35

Landge, Mr Sarang. "A Blockchain-Powered E-Voting System with SHA-256 Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32060.

Pełny tekst źródła
Streszczenie:
E-voting systems hold promise for revolutionizing the electoral process by offering efficiency, accessibility, and transparency. However, concerns about security and integrity have hindered their widespread adoption. In this research paper, we propose a blockchain-based e-voting system leveraging the SHA-256 algorithm to address these challenges. Our system utilizes blockchain technology to create a tamper-proof and immutable ledger of votes, ensuring transparency and accountability throughout the voting process. The SHA-256 algorithm is employed to secure data integrity, providing robust prot
Style APA, Harvard, Vancouver, ISO itp.
36

A, Mahesh Chandra. "Smart Contract-Based E-Commerce System for Transparent and Auto Bmated Transactions Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3123–31. https://doi.org/10.22214/ijraset.2025.68856.

Pełny tekst źródła
Streszczenie:
The migration of E-commerce applications to Blockchain offers a resilient solution to the vulnerabilities inherent in centralized servers. By dispersing data across multiple nodes, Blockchain ensures continuous service availability, even in the event of server failure or cyber attacks. Moreover, its inherent encryption and immutability features guarantee the security and integrity of customer and product data. Blockchain revolutionizes the E-commerce landscape by providing decentralized platforms that address critical challenges such as security, transparency, efficiency, and trust. This techn
Style APA, Harvard, Vancouver, ISO itp.
37

Elsa Wulandari, Annastasya Nabila, and Purwono. "Smart Contracts for Data Sharing in Drug Development a Systematic Review of Security and Transparent Measurement." Journal of Advanced Health Informatics Research 2, no. 1 (2024): 24–37. https://doi.org/10.59247/jahir.v2i1.288.

Pełny tekst źródła
Streszczenie:
This systematic literature review explores the role of smart contracts in improving data sharing for drug development, with an emphasis on security and transparency. Using blockchain technology, smart contracts offer a decentralized tracking mechanism for pharmaceutical supply chains, addressing challenges related to drug authentication and supply chain optimization. The review examined 52 studies using the PRISMA methodology, highlighting the automation of data exchange, reduced reliance on external parties, and acceleration of operational processes. Advanced encryption and strict access cont
Style APA, Harvard, Vancouver, ISO itp.
38

Demertzis, Konstantinos, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis, and Lazaros Iliadis. "A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System." Information 14, no. 9 (2023): 477. http://dx.doi.org/10.3390/info14090477.

Pełny tekst źródła
Streszczenie:
Pursuing “intelligent justice” necessitates an impartial, productive, and technologically driven methodology for judicial determinations. This scholarly composition proposes a framework that harnesses Artificial Intelligence (AI) innovations such as Natural Language Processing (NLP), ChatGPT, ontological alignment, and the semantic web, in conjunction with blockchain and privacy techniques, to examine, deduce, and proffer recommendations for the administration of justice. Specifically, through the integration of blockchain technology, the system affords a secure and transparent infrastructure
Style APA, Harvard, Vancouver, ISO itp.
39

Mohanty, Dr Rajnikanth. "BlockShare – Blockchain Based Secure Data Sharing Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46157.

Pełny tekst źródła
Streszczenie:
Abstract - In the rapidly advancing digital era, the requirement for secure, transparent, and reliable data-sharing mechanisms has become increasingly critical across various sectors. Traditional centralized data-sharing models suffer from inherent limitations, including vulnerability to data breaches, unauthorized access, single points of failure, and insufficient transparency in data access and audit trails. These challenges compromise not only the confidentiality and integrity of sensitive data but also erode stakeholder trust in digital systems. To overcome these issues, this paper present
Style APA, Harvard, Vancouver, ISO itp.
40

Ruth Ramya, K., D. N.V.Saikrishna, T. Sravya Nandini, and R. Tanmai Gayatri. "A Survey on Using Biometrics for Cloud Security." International Journal of Engineering & Technology 7, no. 2.32 (2018): 307. http://dx.doi.org/10.14419/ijet.v7i2.32.15701.

Pełny tekst źródła
Streszczenie:
Cloud computing the most emerging data storage and processing technology. Today many organizations are using cloud-based data storage because of their complex data management. Even though cloud is attracting many users towards using it but there is a requirement of security concerns to be taken care of because cloud is untrusted, the data which individual stores on cloud will be transparent to cloud administrator also which may be confidential. So, while using cloud security is the primary concern. In this paper, we proposed a scheme to encrypt cloud data using user attribute-based encryption.
Style APA, Harvard, Vancouver, ISO itp.
41

Ali, Aitizaz, Bander Ali Saleh Al-rimy, Faisal S. Alsubaei, Abdulwahab Ali Almazroi, and Abdulaleem Ali Almazroi. "HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications." Sensors 23, no. 15 (2023): 6762. http://dx.doi.org/10.3390/s23156762.

Pełny tekst źródła
Streszczenie:
The swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy. This paper proposes a novel approach to enhancing privacy preservation in IoT-based healthc
Style APA, Harvard, Vancouver, ISO itp.
42

Litvinov, V. S., A. A. Vlasov, and D. V. Teytelbaum. "Development of Software for Transparent Remote Access to Technological Parameters of Drilling and Data from a Downhole Telemetry System in Unstable Communication Conditions." Vestnik NSU. Series: Information Technologies 17, no. 2 (2019): 101–13. http://dx.doi.org/10.25205/1818-7900-2019-17-2-101-113.

Pełny tekst źródła
Streszczenie:
In some cases, the drilling of oil and gas wells requires support for the drilling process, which consists in monitoring the parameters and making urgent decisions. Accompanying drilling takes place using the existing communication channels between the office and drilling. Satellite and mobile communications are most common. They are characterized by a low speed of receiving and transmitting data, frequent disconnects, the use of NAT. As part of this work, a software tool has been developed for transparent access to drilling parameters and measurements while drilling from a telemetry system in
Style APA, Harvard, Vancouver, ISO itp.
43

Awasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.

Pełny tekst źródła
Streszczenie:
In the evolving landscape of digital technologies, blockchain has emerged as a cornerstone for building decentralized, transparent, and tamper-proof systems. Central to the security and reliability of blockchain is the use of advanced cryptographic techniques, which ensure data integrity, user privacy, and resistance to malicious attacks. This paper provides a comprehensive analysis of cutting-edge cryptographic technologies that are shaping the future of blockchain networks. Key mechanisms discussed include zero-knowledge proofs, homomorphic encryption, ring signatures, and post-quantum crypt
Style APA, Harvard, Vancouver, ISO itp.
44

Jamali, Mujeeb-ur-Rehman, Dr Najma Nawaz Channa, Aadil Jamali, Asad Ali Jamali, Mazher Ali, and Abdul Khalique Baloch. "Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study." VFAST Transactions on Software Engineering 11, no. 3 (2023): 10–24. http://dx.doi.org/10.21015/vtse.v11i3.1580.

Pełny tekst źródła
Streszczenie:
Blockchain technology is a transparent, and unchangeable distributed ledger. It has the potential to transform the way to interact with the digital world by allowing to construct a decentralized database that is tamper-proof. Concerns regarding the security of confidential and sensitive data being outsourced are rising. It is possible that service providers may be dishonest since unscrupulous administrators have access to, may alter, and can misuse private and sensitive data. Security precautions are necessary because sensitive data stored on public clouds has to be safeguarded. There is no me
Style APA, Harvard, Vancouver, ISO itp.
45

Garcia Valencia, Oscar A., Supawadee Suppadungsuk, Charat Thongprayoon, et al. "Ethical Implications of Chatbot Utilization in Nephrology." Journal of Personalized Medicine 13, no. 9 (2023): 1363. http://dx.doi.org/10.3390/jpm13091363.

Pełny tekst źródła
Streszczenie:
This comprehensive critical review critically examines the ethical implications associated with integrating chatbots into nephrology, aiming to identify concerns, propose policies, and offer potential solutions. Acknowledging the transformative potential of chatbots in healthcare, responsible implementation guided by ethical considerations is of the utmost importance. The review underscores the significance of establishing robust guidelines for data collection, storage, and sharing to safeguard privacy and ensure data security. Future research should prioritize defining appropriate levels of d
Style APA, Harvard, Vancouver, ISO itp.
46

Vittal Rao Baikadolla. "Balancing Innovation and Privacy: Addressing Surveillance Concerns in Healthcare AI Systems." Journal of Computer Science and Technology Studies 7, no. 7 (2025): 921–29. https://doi.org/10.32996/jcsts.2025.7.7.101.

Pełny tekst źródła
Streszczenie:
Healthcare AI systems promise revolutionary advancements in opinion, treatment, and care delivery, yet produce unknown sequestration challenges as these technologies bear vast patient datasets to serve effectively. This pressure between invention and sequestration protection represents an abecedarian incongruity in healthcare's digital metamorphosis. Recent sequestration breaches, instigated by controversial data-participating hookups between healthcare systems and technology companies, have eroded public trust and stressed crunches in traditional concurrence models and nonsupervisory fabrics.
Style APA, Harvard, Vancouver, ISO itp.
47

Chananagari Prabhakar, Rohit Reddy. "Enhancing Data Security in Higher Education Administration: Strategies for Protecting Student Information and Institutional Integrity in Cloud-Based Systems." Journal of Artificial Intelligence & Cloud Computing 2, no. 3 (2023): 1–4. http://dx.doi.org/10.47363/jaicc/2023(2)e150.

Pełny tekst źródła
Streszczenie:
The widespread adoption of cloud-based systems in higher education has brought significant benefits and heightened concerns over data security. This research paper explores practical strategies for enhancing data security in cloud-based systems used by higher education institutions. The study employed a literature review, case studies, and surveys to gather data on current practices, challenges, and technological solutions in data security. The findings reveal that while cloud computing offers convenience and cost savings, it also introduces new vulnerabilities that must be addressed through a
Style APA, Harvard, Vancouver, ISO itp.
48

Ramakrishnan, Mr R., B. Beula grace, and K. Shanmugapriya. "Civis ID with True Face: A Biometric Voting System for Secure and Transparent Elections." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02169.

Pełny tekst źródła
Streszczenie:
The "Civis ID with True Face" project presents an innovative approach to modernizing the electoral process by integrating biometric facial recognition technology for voter authentication. This system addresses critical challenges in traditional voting methods, such as voter fraud, impersonation, and inefficiencies caused by manual verification processes. By leveraging machine learning algorithms and advanced AI models, it ensures that only eligible voters can cast their votes, thus enhancing the security and integrity of elections. The project also prioritizes user accessibility, offering a se
Style APA, Harvard, Vancouver, ISO itp.
49

Sathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.

Pełny tekst źródła
Streszczenie:
Enterprise Resource Planning (ERP) systems have become crucial components in modern business operations, demanding robust security measures to protect sensitive data and maintain operational integrity. This comprehensive article explores the multifaceted aspects of ERP security, focusing on advanced access control mechanisms, data protection strategies, and compliance requirements. The implementation of Role-Based Access Control (RBAC), multi-factor authentication, and biometric verification has significantly enhanced security protocols while improving operational efficiency. Data protection m
Style APA, Harvard, Vancouver, ISO itp.
50

Savchenko, Mykyta, Vitaliy Tsyganok, and Oleh Andriichuk. "Decision Support Systems' Security Model Based on Decentralized Data Platforms." Decision Support Systems' Security Model Based on Decentralized Data Platforms 2318 (June 7, 2018): 209–21. https://doi.org/10.5281/zenodo.13843777.

Pełny tekst źródła
Streszczenie:
Modern information systems, especially high-risk systems which work with important data lack proper security models. Decision support sys- tems and recommendations they produce are extremely dependent on the data they produce recommendations on, hence they require the most secure data platform and transparent history of data input and changes. Many of such sys- tems are centralized and are stored in a single place, like a data center or even a single machine, where important data can be lost easily. Most importantly, it can be tampered without many complications, as for the typical setup there
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!