Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,766,886 papers from all fields of science
Search
Sign In
Create Free Account
System integrity
Known as:
Integrity (disambiguation)
In telecommunications, the term system integrity has the following meanings: 1. * That condition of a system wherein its mandated operational and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Automated information system
Computer hardware
Configuration management
Data integrity
Expand
Broader (3)
Computer security
Reliability engineering
Systems engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Entity identification and security solutions in IoT based on PKI and Blockchain technology
M. Simić
,
Miljan Vučetić
,
T. Unkašević
,
Z. Banjac
,
M. Stanković
19th International Symposium INFOTEH-JAHORINA…
2020
Corpus ID: 215816032
In networked information systems security basic problem is reliable entity identification and trustworthy system history creation…
Expand
2014
2014
Exploring mangrove social-ecological system dynamics in South-East Asia : linking livelihoods , vulnerability and ecosystem services in Vietnam
Steven Orchard
,
L. Stringer
,
C. Quinn
2014
Corpus ID: 17372126
Globally, human activities have led to rapid mangrove degradation. In Vietnam, as across much of coastal South-east Asia…
Expand
2013
2013
Fire alarm system
高桥正树
,
坪川克秀
2013
Corpus ID: 3018221
The present invention provides a fire alarm system regardless of the size of their size, can prevent the occurrence of adverse…
Expand
2006
2006
A Comparison of Modelling Approaches for the Time-Limited Dispatch (TLD) of Aircraft
D. Prescott
,
J. Andrews
2006
Corpus ID: 56305169
The time-limited dispatch (TLD) of aircraft allows operators efficiently to meet certification requirements. In order to show…
Expand
2006
2006
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks
Sebastian Gajek
,
A. Sadeghi
,
Christian Stüble
,
M. Winandy
2006
Corpus ID: 8834570
Identity theft through phishing attacks has fostered to a major concern of Internet users.
2005
2005
Storage-based file system integrity checker
M. Banikazemi
,
D. Poff
,
B. Abali
ACM International Workshop on Storage Security…
2005
Corpus ID: 10778234
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-in-time copy…
Expand
2004
2004
Validating access control policies with Alloy
Waël Hassan
,
L. Logrippo
,
M. Mankai
2004
Corpus ID: 17483684
We present two projects that are being developed in our research group. The first is on inconsistency detection in XACML policies…
Expand
2002
2002
Conservation and status of the fish communities inhabiting the Río Conchos basin and middle Rio Grande, México and U.S.A.
R. Edwards
,
G. Garrett
,
E. Marsh-Matthews
Reviews in Fish Biology and Fisheries
2002
Corpus ID: 23602983
The Chihuahuan Desert region contains a numberof unique aquatic environments, but with fewexceptions, these have been little…
Expand
1999
1999
Non-repudiation evidence generation for CORBA using XML
M. Wichert
,
D. Ingham
,
S. Caughey
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 283905
Focuses on the provision of a non-repudiation service for CORBA. The current OMG specification of a CORBA non-repudiation service…
Expand
1979
1979
Integrating language and database for CAD applications
G. Lafue
1979
Corpus ID: 62728312
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE