Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,145,142 papers from all fields of science
Search
Sign In
Create Free Account
Data security
Known as:
Secure information
Data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ATP Electronics
Application security
Backup
Base One Foundation Component Library (BFC)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Ensure Hierarchal Identity Based Data Security in Cloud Environment
S. Kaushik
,
C. Gandhi
International Journal of Cloud Applications and…
2019
Corpus ID: 201881523
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next…
Expand
Highly Cited
2018
Highly Cited
2018
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
Jiawei Tang
,
Anfeng Liu
,
Ming Zhao
,
Tian Wang
Secur. Commun. Networks
2018
Corpus ID: 3418277
An Aggregate Signature based Trust Routing (ASTR) scheme is proposed to guarantee safe data collection in WSNs. In ASTR scheme…
Expand
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
Review
2012
Review
2012
Ethical Technology Use, Policy, and Reactions in Educational Settings
Kadir Beycioglu
2012
Corpus ID: 16903995
Kadir Beycioglu is a lecturer at Inonu University (Malatya, Turkey). He is the Editor-in-Chief of the International Journal of…
Expand
Highly Cited
2006
Highly Cited
2006
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
Abhishek Nagar
,
S. Chaudhury
International Conference on Pattern Recognition
2006
Corpus ID: 16903167
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This…
Expand
Highly Cited
2005
Highly Cited
2005
Integrity Primitives for Secure Information Systems
A. Bosselaers
,
B. Preneel
Lecture Notes in Computer Science
2005
Corpus ID: 12895857
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination in a SAN File System
Bo Hong
,
D. Plantenberg
,
D. Long
,
M. Sivan-Zimet
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 12290109
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file…
Expand
Highly Cited
2001
Highly Cited
2001
Vertex-disjoint spanning trees of the star network with applications to fault-tolerance and security
A. A. Rescigno
Information Sciences
2001
Corpus ID: 35571543
1998
1998
Spatial and temporal content-based access to hypervideo databases
Haitao Jiang
,
A. Elmagarmid
The VLDB journal
1998
Corpus ID: 19128522
Abstract. Providing content-based video query, retrieval and browsing is the most important goal of a video database management…
Expand
Highly Cited
1987
Highly Cited
1987
Physical Security for the μABYSS System
Steve H. Weingart
IEEE Symposium on Security and Privacy
1987
Corpus ID: 14824345
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE