Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,177,969 papers from all fields of science
Search
Sign In
Create Free Account
Data integrity
Known as:
Database integrity
, User-defined integrity
, Integrity (disambiguation)
Expand
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
ATP Electronics
Authenticated encryption
Biba Model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Blockchain Based Data Integrity Service Framework for IoT Data
Bin Liu
,
X. Yu
,
Shiping Chen
,
Xiwei Xu
,
Liming Zhu
IEEE International Conference on Web Services…
2017
Corpus ID: 4699120
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications because of the inherently…
Expand
Highly Cited
2017
Highly Cited
2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu
,
M. Au
,
+4 authors
Geyong Min
IEEE Transactions on Information Forensics and…
2017
Corpus ID: 7567517
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is…
Expand
Review
2015
Review
2015
The rise of "big data" on cloud computing: Review and open research issues
I. A. Hashem
,
Ibrar Yaqoob
,
N. B. Anuar
,
Salimah Mokhtar
,
A. Gani
,
S. Khan
Information Systems
2015
Corpus ID: 205488005
Highly Cited
2012
Highly Cited
2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu
,
Hongxin Hu
,
Gail-Joon Ahn
,
Mengyang Yu
IEEE Transactions on Parallel and Distributed…
2012
Corpus ID: 9469740
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we…
Expand
Highly Cited
2011
Highly Cited
2011
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Zhuo Hao
,
Sheng Zhong
,
Nenghai Yu
IEEE Transactions on Knowledge and Data…
2011
Corpus ID: 15768222
Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics…
Expand
Review
2007
Review
2007
Pellet: A practical OWL-DL reasoner
E. Sirin
,
B. Parsia
,
B. C. Grau
,
Aditya Kalyanpur
,
Yarden Katz
Journal of Web Semantics
2007
Corpus ID: 101226
Highly Cited
2006
Highly Cited
2006
Authentication and integrity in outsourced databases
E. Mykletun
,
M. Narasimha
,
G. Tsudik
TOS
2006
Corpus ID: 2241633
In the Outsourced Database (ODB) model, entities outsource their data management needs to a third-party service provider. Such a…
Expand
Review
2006
Review
2006
Handbook of Constraint Programming
F. Rossi
,
P. V. Beek
,
T. Walsh
Handbook of Constraint Programming
2006
Corpus ID: 14174798
Highly Cited
2004
Highly Cited
2004
Basic concepts and taxonomy of dependable and secure computing
A. Avizienis
,
J. Laprie
,
B. Randell
,
C. Landwehr
IEEE Transactions on Dependable and Secure…
2004
Corpus ID: 215753451
This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as…
Expand
Highly Cited
1997
Highly Cited
1997
[서평]「Applied Cryptography」
염흥렬
1997
Corpus ID: 60690860
The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE