Multilevel secure data stream processing: Architecture and implementation
… the need for a multilevel secure continuous query processing system. Each multilevel …
Users are required to bind input data sources with the stream schemas explicitly. This is not …
Users are required to bind input data sources with the stream schemas explicitly. This is not …
Secure data sequence query framework based on multiple fogs
K Gu, N Wu, B Yin, W Jia - IEEE Transactions on Emerging …, 2019 - ieeexplore.ieee.org
… a secure data sequence query framework based on multiple fog … security in the process
of data usage, data acquisition and data transmission, including authenticating data sources, …
of data usage, data acquisition and data transmission, including authenticating data sources, …
Secure and efficient health data management through multiple watermarking on medical images
A Giakoumaki, S Pavlopoulos, D Koutsouris - Medical and Biological …, 2006 - Springer
… On the other hand, our multiple watermarking scheme simultaneously addresses a range
of health data management issues having different characteristics and requirements. …
of health data management issues having different characteristics and requirements. …
Cyber security data sources for dynamic network research
AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
… data sources a single log file represents 24 hours of contiguously collected data from multiple
data sources (… For the data sets we have released and associated analysis, we have consid…
data sources (… For the data sets we have released and associated analysis, we have consid…
Multilevel secure data stream processing
… data applications where data sources, data streams, queries, and other components in
DSMS are assigned with security … In order to accelerate processing rates, we explore different …
DSMS are assigned with security … In order to accelerate processing rates, we explore different …
A multipath routing approach for secure data delivery
… scheme is popularly used in secret key management [1],[8]. In … secure message to be
transmitted, then we develop a distributed multipath routing algorithm to find the desired multiple …
transmitted, then we develop a distributed multipath routing algorithm to find the desired multiple …
Secure data deduplication
MW Storer, K Greenan, DDE Long… - … on Storage security and …, 2008 - dl.acm.org
… to secure deduplication: authenticated and anonymous. While the two models are similar,
they each offer slightly different security … a file, the map entry of a different file accessible by the …
they each offer slightly different security … a file, the map entry of a different file accessible by the …
Secure Data Sharing in Multi-Cloud Environments: A Cryptographic Framework for Healthcare Systems
DR Chirra - Revista de Inteligencia Artificial en Medicina, 2024 - redcrevistas.com
… digital health transformation, secure data sharing across multi-… promising avenues for secure
data sharing in multi-cloud … be trained on decentralized data sources without data sharing, …
data sharing in multi-cloud … be trained on decentralized data sources without data sharing, …
ENHANCING DATA PRIVACY AND SECURITY IN MULTI CLOUD ENVIRONMENTS
ME Hossain, MF Kabir, A Al Noman… - BULLET: Jurnal …, 2022 - journal.mediapublikasi.id
… for secure data sharing in Multi Clouds environments. It combines three different protection
… This work helps the continuous process of creating secure security solutions to meet the …
… This work helps the continuous process of creating secure security solutions to meet the …
Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
S Beulah, FR Dhanaseelan - Cluster Computing, 2019 - Springer
… or analysis which requires end-to-end security for the data. A … similar data with light-weight
process using pattern analysis and … This process distributes the security process in multiple …
process using pattern analysis and … This process distributes the security process in multiple …
相关搜索
- multiple watermarking health data management
- dynamic ownership management secure data deduplication
- stream data management system
- multipath routing approach secure data delivery
- secure data transmission minimum overhead
- fog computing secure data aggregation
- robust and secure multiple watermarking
- secure and reliable data transmission
- secure data transfer computer networks
- architecture and implementation data stream processing
- enemy lines data stream processing
- multiple watermarking scheme medical image management
- data stream environments security and privacy
- medical images health data management
- cloud storage secure data deduplication
- data stream systems robust security mechanism