[PDF][PDF] Evaluating the Impact of Database and Data Warehouse Technologies on Organizational Performance: A Systematic Review

NG Maswanganyi, NM Fumani, JK Khoza, BA Thango… - Preprints, 2024 - preprints.org
In recent years of technological advancements, the digitization of information has become a
crucial factor for the growth and sustainability of small and medium-sized enterprises …

Information visualisation methods and techniques: State-of-the-art and future directions

H Shen, T Bednarz, H Nguyen, F Feng, T Wyeld… - Journal of Industrial …, 2019 - Elsevier
Visualisation research explores techniques for conveying information in a meaningful way to
allow users to make sense of data. This paper aims to review state-of-the-art information …

Two-factor data security protection mechanism for cloud storage system

JK Liu, K Liang, W Susilo, J Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …

Fog-based secure communications for low-power IoT devices

L Ferretti, M Marchetti, M Colajanni - ACM Transactions on Internet …, 2019 - dl.acm.org
Designing secure, scalable, and resilient IoT networks is a challenging task because of
resource-constrained devices and no guarantees of reliable network connectivity. Fog …

Secure and efficient data access control in cloud computing environment: a survey

S Namasudra, P Roy - Multiagent and Grid Systems, 2016 - content.iospress.com
Cloud computing is very emerging area in IT industries. In a cloud environment, many
distributed systems are interconnected to provide software, hardware and resources over …

Mapping and classifying molecules from a high-throughput structural database

S De, F Musil, T Ingram, C Baldauf, M Ceriotti - Journal of cheminformatics, 2017 - Springer
High-throughput computational materials design promises to greatly accelerate the process
of discovering new materials and compounds, and of optimizing their properties. The large …

A symmetric cryptographic scheme for data integrity verification in cloud databases

L Ferretti, M Marchetti, M Andreolini, M Colajanni - Information Sciences, 2018 - Elsevier
Cloud database services represent a great opportunity for companies and organizations in
terms of management and cost savings. However, outsourcing private data to external …

[PDF][PDF] Building practical systems that compute on encrypted data

RA Popa - 2014 - people.eecs.berkeley.edu
Theft of confidential data is prevalent. In most applications, confidential data is stored at
servers. Thus, existing systems naturally try to prevent adversaries from compromising these …

An effective approach for the protection of privacy text data in the CloudDB

Z Wu, G Xu, C Lu, E Chen, F Jiang, G Li - World Wide Web, 2018 - Springer
Due to the advantages of pay-on-demand, expand-on-demand and high availability, cloud
databases (CloudDB) have been widely used in information systems. However, since a …

Gait characterization via pulse-Doppler radar

T Yardibi, P Cuddihy, S Genc, C Bufi… - 2011 IEEE …, 2011 - ieeexplore.ieee.org
Falls are a major cause of injury in the elderly with almost 1/3 rd of people aged 65 and
more falling each year. This work aims to use gait measurements from everyday living …