Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,378,861 papers from all fields of science
Search
Sign In
Create Free Account
Data security
Known as:
Secure information
Data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ATP Electronics
Application security
Backup
Base One Foundation Component Library (BFC)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Ethical Technology Use, Policy, and Reactions in Educational Settings
Kadir Beycioglu
2012
Corpus ID: 16903995
Kadir Beycioglu is a lecturer at Inonu University (Malatya, Turkey). He is the Editor-in-Chief of the International Journal of…
Expand
2012
2012
New image watermarking algorithm based on mixed scales wavelets
M. Hajji
,
H. Douzi
,
D. Mammass
,
R. Harba
,
F. Ros
J. Electronic Imaging
2012
Corpus ID: 41999977
Watermarking is a technology for embedding secure information in digital content such as audio, images, and video. An effective…
Expand
2010
2010
Energy Harvesting via Piezoelectricity
Tanvi Dikshit
,
Dhawal Shrivastava
,
A. Gorey
,
Ashish Gupta
,
Parag Parandkar
,
S. Katiyal
2010
Corpus ID: 110366276
In the present era, wireless data transmission techniques are commonly used in electronic devices. For powering them connection…
Expand
2010
2010
Data Quality Evaluation of Electronic Health Records in the Hospital Admission Process
J. Duarte
,
M. Salazar
,
+4 authors
J. Machado
International Conference on Interaction Sciences
2010
Corpus ID: 13489544
Data Quality Evaluation is a critical problem, specially in Healthcare, where people may take decisions based on confident…
Expand
2009
2009
Threat Modelling for Mobile Ad Hoc and Sensor Networks
John A. Clark
,
J. Murdoch
,
+4 authors
P. Rohatgi
2009
Corpus ID: 12187500
This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for…
Expand
2006
2006
A Holistic Reference Framework for e-Government: The Practical Proof of a Scientific Concept
Josef Makolm
Proceedings of the 39th Annual Hawaii…
2006
Corpus ID: 3104933
In the field of e-Government Austria ranks second within the European Union. The following paper describes one contributing…
Expand
Highly Cited
2005
Highly Cited
2005
Integrity Primitives for Secure Information Systems
A. Bosselaers
,
B. Preneel
Lecture Notes in Computer Science
2005
Corpus ID: 12895857
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination in a SAN File System
Bo Hong
,
D. Plantenberg
,
D. Long
,
M. Sivan-Zimet
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 12290109
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file…
Expand
Review
2003
Review
2003
Security issues for the semantic Web
B. Thuraisingham
Proceedings 27th Annual International Computer…
2003
Corpus ID: 16435482
This paper first describes the developments in semantic Web and then provides an overview of secure semantic Web. In particular…
Expand
1993
1993
An introduction to the Mass Storage System Reference Model, version 5
R. Coyne
,
H. Hulen
[] Proceedings Twelfth IEEE Symposium on Mass…
1993
Corpus ID: 5197547
Brief histories of the IEEE Mass Storage System Reference Model and the IEEE Storage System Standards Working Group are presented…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE