Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Data-centric security
Data-centric security is an approach to security that emphasizes the security of the data itself rather than the security of networks, servers, or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Access control
Cloud computing
Data masking
Data security
Expand
Broader (2)
Big data
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
MENA Region: The Case of Metropolitan Cairo
S. Fathy
,
Tarik A. Fathy
2015
Corpus ID: 55925089
Extreme auto dependency, and consequent congestion issues are increasingly exacerbating the urban environments in the…
Expand
2014
2014
Cloudsweeper and data-centric security
Peter Snyder
,
Chris Kanich
Computer Science On-line Conference
2014
Corpus ID: 18027394
Most security online is binary, where being authorized to access a system allows complete access to the requested resource. This…
Expand
2012
2012
Constructing a learner centric semantic open syllabus for automated text book generation
Aliabbas Petiwala
,
Kannan M. Moudgalya
IEEE International Conference on Technology…
2012
Corpus ID: 40580365
This paper proposes a methodology for semantic open syllabus construction to be eventually used by an automated and collaborative…
Expand
2012
2012
Architecture for data-centric security
R. Lee
,
Yu-Yuan Chen
2012
Corpus ID: 63946544
In today's computing environment, we use various applications on our various computing devices to process our data. However, we…
Expand
2011
2011
Towards data centric mobile security
A. Dehghantanha
,
N. Udzir
,
R. Mahmod
Annual Meeting of the IEEE Industry Applications…
2011
Corpus ID: 18827925
Recently the usage of mobile devices has increased rapidly and it will be growing even more as mobile devices functionality is at…
Expand
2011
2011
A new access control framework in Grid Environments
Hakimeh Alemi Baktash
,
Mohammadbagher Karimi
,
M. Meybodi
,
Asgarali Bouyer
,
Islamic Azad University-Qazvin
,
Islamic Azad University-Tabriz
2011
Corpus ID: 54936513
In recent years, the complexity of dynamic and collaborative computing environments in Grid is increasing and hence the access…
Expand
2011
2011
Data Centric Techniques for Mapping Performance Measurements
Nick Rutar
,
J. Hollingsworth
IEEE International Symposium on Parallel…
2011
Corpus ID: 14635046
Traditional methods of performance analysis offer a code centric view, presenting performance data in terms of blocks of…
Expand
2011
2011
Foo's To Blame: Techniques For Mapping Performance Data To Program Variables
Nick Rutar
2011
Corpus ID: 1077893
Title of dissertation: FOO’S TO BLAME: TECHNIQUES FOR MAPPING PERFORMANCE DATA TO PROGRAM VARIABLES Nickolas Jon Rutar, Doctor of…
Expand
2005
2005
On Profiling Mobility and Predicting Locations of Campus-Wide Wireless Network Users
J. Ghosh
,
Matthew J. Beal
,
H. Ngo
,
C. Qiao
2005
Corpus ID: 15028152
In this paper, we analyze a year long wireless network users’ mobility trace data collected on ETH Zurich campus. Unlike earlier…
Expand
1993
1993
Centric relation or centric occlusion? Choosing the best restorative procedure.
Petrie Je
1993
Corpus ID: 64185335
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE