Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Data at rest

Data at rest in information technology means inactive data that is stored physically in any digital form (e.g. databases, data warehouses… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
We present DIME, an integrated solution for the rigorous model-driven development of sophisticated web applications based on the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2015
2015
Cloud computing is one of today's most appealing technology areas due to its cost-efficiency and flexibility. However, despite… Expand
2015
2015
The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
2013
2013
Information from multiple sources is growing at a staggering rate. The number of Internet users reached 2.27 billion in 2012… Expand
  • figure 1
  • figure 2
  • figure 3
Review
2011
Review
2011
Abstract The idea, the concept, and the term, that is cloud computing, has recently passed into common currency and the academic… Expand
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 5
2009
2009
"Cloud Computing" offers many potential benefits, including cost savings, the ability to deploy applications and services quickly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
This paper documents the BitLocker Drive Encryption system included with some versions of Microsoft's Windows Vista. In… Expand
  • figure 1
  • figure 2
  • table 1
  • table 3
  • table 4
2005
2005
The information security train has been running at 100 miles per hour for a few years now - unfortunately, though, we're going in… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 7
  • figure 8
2004
2004
This paper describes a highly original and new approach to securing data on workstations (desktops and laptops) that has been… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1