Data integrity

Results: 897



#Item
1Whitepaper DATA INTEGRITY FOR SUPPLY CHAIN OPERATIONS, POWERED BY BLOCKCHAIN TECHNOLOGY modum.io sensor devices record environmental conditions while physical products are in transit. When a change in ownership occurs, t

Whitepaper DATA INTEGRITY FOR SUPPLY CHAIN OPERATIONS, POWERED BY BLOCKCHAIN TECHNOLOGY modum.io sensor devices record environmental conditions while physical products are in transit. When a change in ownership occurs, t

Add to Reading List

Source URL: modum.io

Language: English - Date: 2018-10-16 03:23:32
2OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data Matthias Sch¨afer¶‡∗ , Martin Strohmeier¶† , Matthew Smith¶† , Markus Fuchs¶‡ , Vincent Lenders¶§ , Ivan Martinovic¶†

OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data Matthias Sch¨afer¶‡∗ , Martin Strohmeier¶† , Matthew Smith¶† , Markus Fuchs¶‡ , Vincent Lenders¶§ , Ivan Martinovic¶†

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-08-23 02:40:40
3Always-On Data Integrity 385 Moffett Park Dr. Sunnyvale, CA8349

Always-On Data Integrity 385 Moffett Park Dr. Sunnyvale, CA8349

Add to Reading List

Source URL: cdna.datrium.com

Language: English - Date: 2018-02-12 16:57:25
    4The institution protects the security, confidentiality, and integrity of its student records and maintains security measures to protect and back up data. (Student records)  X Compliance

    The institution protects the security, confidentiality, and integrity of its student records and maintains security measures to protect and back up data. (Student records) X Compliance

    Add to Reading List

    Source URL: sacs.cv.edu

    Language: English - Date: 2013-03-13 13:38:26
      5Protecting Secret Data from Insider Attacks David Dagon, Wenke Lee, Richard Lipton {dagon, wenke, rjl}@cc.gatech.edu Georgia Institute of Technology  Abstract. We consider defenses against confidentiality and integrity a

      Protecting Secret Data from Insider Attacks David Dagon, Wenke Lee, Richard Lipton {dagon, wenke, rjl}@cc.gatech.edu Georgia Institute of Technology Abstract. We consider defenses against confidentiality and integrity a

      Add to Reading List

      Source URL: fc05.ifca.ai

      Language: English - Date: 2005-01-17 11:25:48
        6Preserving Linked Data on the Semantic Web by the application of Link Integrity techniques from Hypermedia Rob Vesse, Wendy Hall and Les Carr {rav08r,wh,lac}@ecs.soton.ac.uk

        Preserving Linked Data on the Semantic Web by the application of Link Integrity techniques from Hypermedia Rob Vesse, Wendy Hall and Les Carr {rav08r,wh,lac}@ecs.soton.ac.uk

        Add to Reading List

        Source URL: events.linkeddata.org

        Language: English - Date: 2010-04-27 12:09:15
          7DataShield: Configurable Data Confidentiality and Integrity Scott A. Carr  Purdue University  ABSTRACT

          DataShield: Configurable Data Confidentiality and Integrity Scott A. Carr Purdue University ABSTRACT

          Add to Reading List

          Source URL: nebelwelt.net

          Language: English - Date: 2018-08-13 04:44:11
            8Decision Support for Data Segmentation (DS2): Contextual Integrity Considerations Martin French, Helen Nissenbaum, Mike Berry, Noam Arzt, and Carl A. Gunter June 2, 2014  Acknowledgements

            Decision Support for Data Segmentation (DS2): Contextual Integrity Considerations Martin French, Helen Nissenbaum, Mike Berry, Noam Arzt, and Carl A. Gunter June 2, 2014 Acknowledgements

            Add to Reading List

            Source URL: sharps.org

            Language: English - Date: 2014-06-20 15:52:26
              9protecting modbus operated ics assets  Fox DataDiode Modbus Replicator Modbus data can be transparently replicated through the Fox DataDiode. In this way, the integrity of devices in critical production

              protecting modbus operated ics assets Fox DataDiode Modbus Replicator Modbus data can be transparently replicated through the Fox DataDiode. In this way, the integrity of devices in critical production

              Add to Reading List

              Source URL: www.fox-it.com

              Language: English - Date: 2018-04-20 09:36:37
                10UNIVERSITY RESEARCH ETHICS COMMITTEE University of Cambridge Policy on the Ethics of Research Involving Human Participants and Personal Data A. Policy Statement i.

                UNIVERSITY RESEARCH ETHICS COMMITTEE University of Cambridge Policy on the Ethics of Research Involving Human Participants and Personal Data A. Policy Statement i.

                Add to Reading List

                Source URL: www.research-integrity.admin.cam.ac.uk

                - Date: 2014-10-07 05:34:04