Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
Security and privacy aspects in MapReduce on clouds: A survey
MapReduce is a programming system for distributed processing of large-scale data in an
efficient and fault tolerant manner on a private, public, or hybrid cloud. MapReduce is …
efficient and fault tolerant manner on a private, public, or hybrid cloud. MapReduce is …
Database meets artificial intelligence: A survey
Database and Artificial Intelligence (AI) can benefit from each other. On one hand, AI can
make database more intelligent (AI4DB). For example, traditional empirical database …
make database more intelligent (AI4DB). For example, traditional empirical database …
Big data security and privacy
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …
make today possible to collect huge amounts of data. However, for data to be used to their …
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research
efforts have been devoted to the development of privacy protecting technology. We recently …
efforts have been devoted to the development of privacy protecting technology. We recently …
Privacy-aware role-based access control
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …
control mechanism, that is, a mechanism tailored to enforce access control to data …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
On purpose and by necessity: compliance under the GDPR
Abstract The European General Data Protection Regulation (GDPR) gives primacy to
purpose: Data may be collected and stored only when (i) end-users have consented, often …
purpose: Data may be collected and stored only when (i) end-users have consented, often …
[HTML][HTML] Patient consent management by a purpose-based consent model for electronic health record based on blockchain technology
Objectives Currently, patients' consent is essential to use their medical records for various
purposes; however, most people give their consent using paper forms and have no control …
purposes; however, most people give their consent using paper forms and have no control …
Privacy aware access control for big data: A research roadmap
Big Data is an emerging phenomenon that is rapidly changing business models and work
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …