Data-centric security

Results: 37



#Item
1Computing / Data management / Information science / Information / Data management plan / Data-intensive computing / Data center / Research data archiving / Data curation / Cloud computing security / Open data

Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011

Add to Reading List

Source URL: ssdbm2011.ssdbm.org

Language: English - Date: 2011-09-01 19:47:29
2Data management / Computer security / Information technology management / Data governance / Information technology governance / Cloud computing security / Enterprise data management / Cloud storage / Cloud computing / Data quality / Data defined storage / Data-centric security

Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2016-06-07 21:04:42
3

Institute for Cyber Security Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair

Add to Reading List

Source URL: profsandhu.com

- Date: 2013-10-09 17:57:42
    4Computing / Sqrrl / Data / Data management / Computer security / Data-centric security / Bigtable / Big data

    Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2014-10-07 15:52:42
    5Security / Computing / Computer networking / Access control / Computer access control / Named data networking / Computer security / Computer network security / Content centric networking / Computer network / Router / IBAC

    Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:45
    6

    Towards a Data-centric View of Cloud Security Wenchao Zhou[ Micah Sherr\ William R. Marczak] Zhuoyao Zhang[ Tao Tao[ Boon Thau Loo[ Insup Lee[ [

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2010-10-31 23:40:39
      7

      2013 IEEE Security and Privacy Workshops Preventive Inference Control in Data-centric Business Models Rafael Accorsi and G¨unter M¨uller University of Freiburg, Germany

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2013-05-05 16:04:46
        8

        Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

        Add to Reading List

        Source URL: www.prianto.ch

        Language: English - Date: 2013-03-08 10:05:06
          9

          Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

          Add to Reading List

          Source URL: www.prianto.at

          Language: English - Date: 2013-03-08 10:05:06
            10Data security / Quality / Electronic engineering / Smart card / Ubiquitous computing / ISO/IEC 14443

            Stefan Bumerl, Managing Director CRYPTAS Stefan is founder and managing director of CRYPTAS it-Security GmbH and is recognized as an innovator in the field of user-centric identities in highscaling market oriented system

            Add to Reading List

            Source URL: www.trustindigitallife.eu

            Language: English - Date: 2015-03-19 08:38:45
            UPDATE