Data integrity

Results: 897



#Item
51Intellectual property law / Copyright law / Monopoly / Copyright / Data management / Intellectual property / United States Copyright Office / Moral rights / Philosophy of copyright / Paul Goldstein

t Authors, Attribution, and Integrity A SYM P O S I U M O N M O R A L R I G H T S April 18, 2016 | Washington, DC

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2016-04-15 13:25:10
52Software engineering / Computing / Computer programming / Software bugs / Data types / Primitive types / Memory management / Pointer / Swift / Memory corruption / Reference / C dynamic memory allocation

Code-Pointer Integrity Volodmyr Kuzentsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song (c) TriStar Pictures, Inc. & Touchstone Pictures, 1997

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
53

1 Statistical Structure Learning to Ensure Data Integrity in Smart Grid Hanie Sedghi and Edmond Jonckheere Department of Electrical Engineering

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2015-02-24 01:37:44
    54Software engineering / Computing / Computer programming / Software bugs / Data types / Memory management / Primitive types / Programming language implementation / Pointer / Memory safety / Dangling pointer / Buffer overflow protection

    Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    55Software engineering / Computer programming / Computing / Method / Data types / C++ / Virtual method table / Control-flow integrity / Dangling pointer / Method overriding / Pointer / Control flow

    VTrust: Regaining Trust on Virtual Calls Chao Zhang Scott A. Carr Tongxin Li

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    56Data management / Computing / Data / Data modeling / Functional dependency / Data analysis / Referential integrity / Join / Random sample consensus

    Scaling Out the Discovery of Inclusion Dependencies Sebastian Kruse, Thorsten Papenbrock, Felix Naumann Hasso Plattner Institute Prof.-Dr.-Helmert-Str. 2-3, 14482 Potsdam Abstract: Inclusion dep

    Add to Reading List

    Source URL: hpi.de

    Language: English - Date: 2015-04-10 06:00:00
    57Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Secure communication / Key server / Man-in-the-middle attack / Public key certificate / Certificate authority / Anonymity / HTTPS

    Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2016-02-10 20:40:16
    58

    Application Security & Integrity Secure by Design • Raw data is parsed among hundreds of “tables” in Microsoft SQL Server. By combining the full features of MS SQL security framework within a fragmented table struc

    Add to Reading List

    Source URL: www.oerca.com

    Language: English - Date: 2014-07-23 14:12:34
      59Cryptography / Data quality / Crime prevention / Information governance / National security / Data integrity / Key size / Computer security / Requirement / NIST Special Publication 800-53

      Comments Received Final Draft of Special Publication

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-10-30 12:22:04
      60

      Lexis® Diligence provides access to the data you need to make better decisions and protect the integrity of your organization. Conducting an Investigation Working with Results

      Add to Reading List

      Source URL: lexisnexis.com

      Language: English - Date: 2012-10-16 10:52:26
        UPDATE