Evaluating the impact of database and data warehouse technologies on organizational performance: A systematic review
N Maswanganyi, N Fumani, JK Khoza… - Available at SSRN …, 2024 - papers.ssrn.com
In recent years of technological advancements, the digitization of information has become a
crucial factor for the growth and sustainability of small and medium-sized enterprises …
crucial factor for the growth and sustainability of small and medium-sized enterprises …
Information visualisation methods and techniques: State-of-the-art and future directions
Visualisation research explores techniques for conveying information in a meaningful way to
allow users to make sense of data. This paper aims to review state-of-the-art information …
allow users to make sense of data. This paper aims to review state-of-the-art information …
Two-factor data security protection mechanism for cloud storage system
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …
revocability for cloud storage system. Our system allows a sender to send an encrypted …
Fog-based secure communications for low-power IoT devices
Designing secure, scalable, and resilient IoT networks is a challenging task because of
resource-constrained devices and no guarantees of reliable network connectivity. Fog …
resource-constrained devices and no guarantees of reliable network connectivity. Fog …
Secure and efficient data access control in cloud computing environment: a survey
Cloud computing is very emerging area in IT industries. In a cloud environment, many
distributed systems are interconnected to provide software, hardware and resources over …
distributed systems are interconnected to provide software, hardware and resources over …
Map** and classifying molecules from a high-throughput structural database
High-throughput computational materials design promises to greatly accelerate the process
of discovering new materials and compounds, and of optimizing their properties. The large …
of discovering new materials and compounds, and of optimizing their properties. The large …
A symmetric cryptographic scheme for data integrity verification in cloud databases
Cloud database services represent a great opportunity for companies and organizations in
terms of management and cost savings. However, outsourcing private data to external …
terms of management and cost savings. However, outsourcing private data to external …
RETRACTED ARTICLE: Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
W Shaorong, L Guiling - Soft Computing, 2023 - Springer
The continuous progress of society has created conditions for the widespread use of
information technology. People rely more and more on information technology and the …
information technology. People rely more and more on information technology and the …
[PDF][PDF] Building practical systems that compute on encrypted data
RA Popa - 2014 - people.eecs.berkeley.edu
Theft of confidential data is prevalent. In most applications, confidential data is stored at
servers. Thus, existing systems naturally try to prevent adversaries from compromising these …
servers. Thus, existing systems naturally try to prevent adversaries from compromising these …
An effective approach for the protection of privacy text data in the CloudDB
Due to the advantages of pay-on-demand, expand-on-demand and high availability, cloud
databases (CloudDB) have been widely used in information systems. However, since a …
databases (CloudDB) have been widely used in information systems. However, since a …