[PDF][PDF] Evaluating the Impact of Database and Data Warehouse Technologies on Organizational Performance: A Systematic Review
NG Maswanganyi, NM Fumani, JK Khoza, BA Thango… - Preprints, 2024 - preprints.org
In recent years of technological advancements, the digitization of information has become a
crucial factor for the growth and sustainability of small and medium-sized enterprises …
crucial factor for the growth and sustainability of small and medium-sized enterprises …
Information visualisation methods and techniques: State-of-the-art and future directions
Visualisation research explores techniques for conveying information in a meaningful way to
allow users to make sense of data. This paper aims to review state-of-the-art information …
allow users to make sense of data. This paper aims to review state-of-the-art information …
Two-factor data security protection mechanism for cloud storage system
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …
revocability for cloud storage system. Our system allows a sender to send an encrypted …
Fog-based secure communications for low-power IoT devices
Designing secure, scalable, and resilient IoT networks is a challenging task because of
resource-constrained devices and no guarantees of reliable network connectivity. Fog …
resource-constrained devices and no guarantees of reliable network connectivity. Fog …
Secure and efficient data access control in cloud computing environment: a survey
S Namasudra, P Roy - Multiagent and Grid Systems, 2016 - content.iospress.com
Cloud computing is very emerging area in IT industries. In a cloud environment, many
distributed systems are interconnected to provide software, hardware and resources over …
distributed systems are interconnected to provide software, hardware and resources over …
Mapping and classifying molecules from a high-throughput structural database
High-throughput computational materials design promises to greatly accelerate the process
of discovering new materials and compounds, and of optimizing their properties. The large …
of discovering new materials and compounds, and of optimizing their properties. The large …
A symmetric cryptographic scheme for data integrity verification in cloud databases
Cloud database services represent a great opportunity for companies and organizations in
terms of management and cost savings. However, outsourcing private data to external …
terms of management and cost savings. However, outsourcing private data to external …
[PDF][PDF] Building practical systems that compute on encrypted data
RA Popa - 2014 - people.eecs.berkeley.edu
Theft of confidential data is prevalent. In most applications, confidential data is stored at
servers. Thus, existing systems naturally try to prevent adversaries from compromising these …
servers. Thus, existing systems naturally try to prevent adversaries from compromising these …
An effective approach for the protection of privacy text data in the CloudDB
Due to the advantages of pay-on-demand, expand-on-demand and high availability, cloud
databases (CloudDB) have been widely used in information systems. However, since a …
databases (CloudDB) have been widely used in information systems. However, since a …
Gait characterization via pulse-Doppler radar
Falls are a major cause of injury in the elderly with almost 1/3 rd of people aged 65 and
more falling each year. This work aims to use gait measurements from everyday living …
more falling each year. This work aims to use gait measurements from everyday living …