咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 6 篇 data-at-rest
  • 3 篇 cloud computing
  • 2 篇 data-in-transit
  • 2 篇 encryption
  • 1 篇 just-in-time new...
  • 1 篇 table lookup
  • 1 篇 cyber attacks
  • 1 篇 data-in-motion
  • 1 篇 substitution con...
  • 1 篇 data security
  • 1 篇 data integrity
  • 1 篇 data provenance
  • 1 篇 news
  • 1 篇 elastic demands
  • 1 篇 key management s...
  • 1 篇 software algorit...
  • 1 篇 big data
  • 1 篇 anomaly detectio...
  • 1 篇 matrices
  • 1 篇 fodder

机构

  • 1 篇 pacific northwes...
  • 1 篇 natl resilience ...
  • 1 篇 bittrex seattle ...
  • 1 篇 vaas capital llc...
  • 1 篇 sunspec alliance...
  • 1 篇 abdelhamid mehri...
  • 1 篇 indian inst tech...
  • 1 篇 guardtime tallin...
  • 1 篇 code x st peters...
  • 1 篇 apple inc cupert...
  • 1 篇 ibm thomas j wat...
  • 1 篇 univ missouri co...
  • 1 篇 military college...

作者

  • 1 篇 kacha lynda
  • 1 篇 raymond g.
  • 1 篇 moralez a.
  • 1 篇 day g.
  • 1 篇 vallabhaneni pra...
  • 1 篇 althobaiti abdul...
  • 1 篇 gourisetti s.
  • 1 篇 plummer j.
  • 1 篇 allwardt c.
  • 1 篇 ali md rasid
  • 1 篇 hassabnis amey
  • 1 篇 das abhijit
  • 1 篇 chawla a.
  • 1 篇 shah syed yousaf
  • 1 篇 akella ravi
  • 1 篇 chowdhury dipanw...
  • 1 篇 paulovicks brent
  • 1 篇 anand abhilash
  • 1 篇 bishop r.
  • 1 篇 sebastian-carden...

语言

  • 6 篇 英文
检索条件"主题词=data-at-rest"
6 条 记 录,以下是1-10 订阅
排序:
HARPOCRATES: An Approach Towards Efficient Encryption of data-at-rest
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 2025年 第1期13卷 173-184页
作者: Ali, Md Rasid Pal, Debranjan Das, Abhijit Chowdhury, Dipanwita Roy Indian Inst Technol Kharagpur Dept Comp Sci Engn Kharagpur 721302 West Bengal India
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The new design structure that we use is called the substitution convolution network. The nov... 详细信息
来源: 评论
data-at-rest Security for Spark  4
Data-at-Rest Security for Spark
收藏 引用
4th IEEE International Conference on Big data (Big data)
作者: Shah, Syed Yousaf Paulovicks, Brent Zerfos, Petros IBM Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
Apache Spark enables fast computations and greatly accelerates analytics applications by efficiently utilizing the main memory and caching data for later use. At its core Apache Spark uses data structures called RDDs ... 详细信息
来源: 评论
Qcrypt: Leveraging Post-Quantum Cryptography for Enhanced Security of data at rest  15
Qcrypt: Leveraging Post-Quantum Cryptography for Enhanced Se...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Anand, Abhilash Hassabnis, Amey Military College of Telecommunication Engineering Faculty of Communication Engineering Madhya Pradesh Indore India
The cryptographic landscape is undergoing a significant transformation with the integration of Post-Quantum Cryptography (PQC) algorithms. In today's interconnected world, securing data at rest using quantum-resis... 详细信息
来源: 评论
Digital data provenance for the power grid based on a Keyless Infrastructure Security Solution
Digital data provenance for the power grid based on a Keyles...
收藏 引用
Resilience Week (RWS)
作者: Sebastian-Cardenas, D. Gourisetti, S. Mylrea, M. Moralez, A. Day, G. Tatireddy, V Allwardt, C. Singh, R. Bishop, R. Kaur, K. Plummer, J. Raymond, G. Johnson, B. Chawla, A. Pacific Northwest Natl Lab Richland WA 99352 USA Natl Resilience Inc San Diego CA USA Apple Inc Cupertino CA 95014 USA Guardtime Tallinn Estonia VAAS Capital LLC Irvine CA USA Bittrex Seattle WA USA Code X St Petersburg FL USA Sunspec Alliance San Jose CA USA
In this work a data provenance system for grid-oriented applications is presented. The proposed Keyless Infrastructure Security Solution (KISS) provides mechanisms to store and maintain digital data fingerprints that ... 详细信息
来源: 评论
data Integrity Protection through Security Monitoring for Just-in-Time News Feeds  4
Data Integrity Protection through Security Monitoring for Ju...
收藏 引用
4th IEEE International Conference on Cloud Networking (CloudNet)
作者: Althobaiti, Abdulrahman Calyam, Prasad Akella, Ravi Vallabhaneni, Prabhu Univ Missouri Columbia MO 65211 USA
There has recently been a major shift in news related media consumption trends and readers are increasingly relying on just-in-time news feeds versus the traditional newspaper print medium. Cloud-networked infrastruct... 详细信息
来源: 评论
An Overview on data Security in Cloud Computing
An Overview on Data Security in Cloud Computing
收藏 引用
Conference on Computational Methods in Systems and Software (CoMeSySo)
作者: Kacha, Lynda Zitouni, Abdelhafid Abdelhamid Mehri Constantine 2 Univ Lire Labs Ali Mendjli 25000 Constantine Algeria
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (da... 详细信息
来源: 评论