Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- ...tional security implications of asymmetric access to and use of biological data ...cribes security implications of asymmetric access to and use of biological data.47 KB (6,188 words) - 18:25, 18 June 2019
- ...RFI for evaluating cannabis testing LIMS vendors/LIMS: Software security, data integrity, and related policies}}172 bytes (24 words) - 22:49, 3 January 2024
- {{wikipedia::Payment Card Industry Data Security Standard}} [[Category:Data security standards]]448 bytes (59 words) - 21:07, 21 June 2016
- ==XML and internal data escaping== Escaping is required in internal data representations, too. For example, incorrectly escaped strings in XML could3 KB (534 words) - 22:18, 10 August 2016
- ==Insecure data transfer== Data transferred unencrypted can be sniffed. This can not only give an attacker4 KB (686 words) - 22:36, 10 August 2016
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
Page text matches
- |title_full = Understanding cybersecurity frameworks and information security standards: A review and comprehensive overview ...tandards demonstrate whether an [[information management]] system can meet security requirements through a range of best practices and procedures. A range of s94 KB (12,503 words) - 17:15, 16 March 2023
- ..._full = An overview of data warehouse and data lake in modern enterprise data management |journal = ''Big Data and Cognitive Computing''130 KB (18,351 words) - 16:15, 3 May 2023
- |title_full = Multilevel classification of security concerns in cloud computing ...amic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.56 KB (7,679 words) - 18:43, 6 October 2021
- ...o detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is c ...imal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit136 KB (18,556 words) - 18:40, 6 October 2021
- ...oals, with the effective use of resources: people, time, money, equipment, data, and [[information]]. The fundamental goals of laboratory work haven’t ch ...ntion in their application and management to protect electronic laboratory data, ensure that it can be effectively used, and ensure that the systems and pr218 KB (34,907 words) - 16:00, 29 March 2024
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- |title_full = Cross-border data transfer regulation in China ...Protection Law, demonstrates China's great willingness towards a stronger data protection regime and more flexible regulatory mechanism.68 KB (9,682 words) - 19:21, 31 July 2021
- |title_full = Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges ...nd giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectiv44 KB (6,151 words) - 18:54, 14 October 2019
- |title_full = Security and privacy in cloud-based eHealth systems ...re on different approaches and mechanisms used in [[eHealth]] to deal with security and privacy issues. Some of these approaches have strengths and weaknesses.60 KB (8,281 words) - 20:49, 19 September 2021
- ...-MASS: An ISO 8000-61-based data quality management methodology for sensor data .... This paper introduces DAQUA-MASS, a methodology based on ISO 8000-61 for data quality management in sensor networks. The methodology consists of four ste90 KB (13,287 words) - 18:28, 25 November 2019
- |title_full = A security review of local government using NIST CSF: A case study ...automation and control systems, Part 3-3: System security requirements and security levels |work=ANSI/ISA-62443-3-3 (99.03.03)-2013 |author=ISA |date=12 August53 KB (7,071 words) - 18:38, 6 October 2021
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
- '''Keywords''': cybersecurity, ethics, smart information systems, big data ...Security Base,” whose mission is to provide security to critical national security assets.<ref name="SingerCyber14" />67 KB (9,997 words) - 21:00, 19 September 2021
- ...studied articles. Our results also showed that publications on [[physical security]] account for only one percent of the literature, and research in this area ...journal |title=The ABC of ransomware protection |journal=Computer Fraud & Security |author=Furnell, S.; Emm, D. |volume=2017 |issue=10 |pages=5–11 |year=20156 KB (6,952 words) - 18:28, 5 May 2020
- ...of its decentralization feature combined with [[Information security|data security]] and [[Information privacy|privacy]], while cloud provides solutions to th ...r the healthcare industry to design and develop a [[Information management|data management]] system for better patient care.128 KB (16,620 words) - 15:45, 2 November 2021
- |title_full = Big data management for cloud-enabled geological information services ...ents the application development opportunities and technical trends of big data management in CEGIS, including collection and preprocessing, storage and ma69 KB (9,778 words) - 22:40, 20 February 2018
- |title_full = Data management challenges for artificial intelligence in plant and agricultural ...identifies and discusses eight key challenges in [[Information management|data management]] that must be addressed to further unlock the potential of AI i148 KB (20,856 words) - 16:28, 29 April 2024
- |title_full = A view of programming scalable data analysis: From clouds to exascale ...the main challenges to be addressed and solved for implementing innovative data analysis applications on exascale systems currently are.88 KB (12,480 words) - 18:40, 6 October 2021
- ...Informatics: A health informatics framework for verifiable and explainable data analysis ...tion, and servicing and processing changes throughout the lifecycle of the data management process. This is necessary in certain events, such as when the s75 KB (11,590 words) - 16:25, 29 April 2024
- ...uitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app develop ...y education, app permission, mobile security awareness, user privacy, user security, sensor attacks89 KB (12,939 words) - 20:08, 26 November 2019