Data-centric security

Results: 37



#Item
21Workflow / Computing / Data management / Data / Decision support system / Payment Card Industry Data Security Standard / Database management systems / Cloud computing / Database

Policy Machine Enabling an Enterprise-wide, Data Centric Operating Environment David Ferraiolo & Serban Gavrila

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-01 09:07:40
22Distributed computing / Cryptography / Data security / Heartland Payment Systems / Cloud computing / Tokenization / Data center / Vormetric / Linoma Software / Computing / Data management / Concurrent computing

Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

Add to Reading List

Source URL: www.prianto.com

Language: English - Date: 2013-03-08 10:05:06
23Technology / Bandwidth / Communications satellite / Electromagnetic interference / Wideband / Electromagnetism / Integral Systems / Kratos Defense & Security Solutions / Electronics / Radio

June 11, 2012 Photo Release -- Kratos RT Logic Ships New 250 MHz Bandwidth RF Channel Simulator for Satellite Wideband Signal Assurance Essential Test & Training Equipment for High-Capacity Net-centric, Data, Image and

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2013-09-06 12:14:41
24Workflow / Data management / Business / Decision support system / Bureau of Diplomatic Security / Computing / Cloud computing / Database

Policy Machine Enabling an Enterprise-wide, Data Centric Operating Environment David Ferraiolo & Serban Gavrila National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:52:27
25Middleware / Crime prevention / National security / Information / GLite / Computer security / Grid computing / Data security / Grid Security Infrastructure / Computer network security / Computing / Security

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 00, NO. 00, [removed]Data-Centric Privacy Protocol for Intensive Care Grids

Add to Reading List

Source URL: linc.ucy.ac.cy

Language: English - Date: 2013-07-11 05:24:46
26Data collection / Military intelligence / Command and control / Military / Network-centric warfare / Technical intelligence / Fog of war / Central Intelligence Agency / Civil affairs / Military science / National security / Intelligence

Microsoft Word - Scales.doc

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:30:00
27Telecommunications data retention / United States Citizenship and Immigration Services / Communist Party of Quebec / Database management system

Department of Homeland Security Privacy Impact Assessment Person Centric Query Service

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2007-07-02 12:18:36
28Distributed computing / Archive formats / Zip / PKZIP / Data center / Cloud computing / Computing / Concurrent computing / PKWARE /  Inc

SOLUTION SHEET: PKWARE DATA CENTER SOLUTION The Industry Standard for the Total Integration of Data Reduction and Security; Shrinking Transport and Storage Costs while Providing Data-centric Security

Add to Reading List

Source URL: www.pkware.com

Language: English - Date: 2014-07-07 13:04:58
29Archive formats / PKWARE /  Inc / Zip / PKZIP / Cloud computing / Data center / Computing / Concurrent computing / Distributed computing

SOLUTION SHEET: PKWARE VIRTUALIZATION SOLUTION Proven to Reduce the Size of Data, Shrinking Transport and Storage Costs by Up to 95% with Guaranteed Data-centric Security While at Rest or in Motion.

Add to Reading List

Source URL: www.pkware.com

Language: English - Date: 2014-07-07 13:06:27
30Net-centric / Military / Grid computing / Military communications / Data security / NetOps / Global Information Grid / Department of Defense Information Assurance Certification and Accreditation Process / Information assurance / Computer security / Security / Information technology management

PDF Document

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2012-09-04 13:01:10
UPDATE