Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Data security

Known as: Secure information 
Data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
One particular trend observed in healthcare is the progressive shift of data and services to the cloud, partly due to convenience… Expand
  • figure 1
  • figure 2
Highly Cited
2014
Highly Cited
2014
Chapter 1: Conceptualising Data What are data? Kinds of data Data, information, knowledge, wisdom Framing data Thinking… Expand
Highly Cited
2012
Highly Cited
2012
Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources… Expand
  • figure 1
  • figure 2
Highly Cited
2012
Highly Cited
2012
  • Deyan Chen, H. Zhao
  • International Conference on Computer Science and…
  • 2012
  • Corpus ID: 18220271
It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to… Expand
  • figure 1
  • figure 2
Review
2010
Review
2010
The wireless body area network has emerged as a new technology for e-healthcare that allows the data of a patient's vital body… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Highly Cited
2009
Highly Cited
2009
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions… Expand
  • figure 1
  • figure 2
  • table I
Highly Cited
2009
Highly Cited
2009
Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a… Expand
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… Expand
Highly Cited
1982
Highly Cited
1982
From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises… Expand
Highly Cited
1976
Highly Cited
1976
This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined… Expand
  • figure 1
  • figure 2