Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- This category is dedicated to any standards related to data security and encryption.7 members (0 subcategories, 0 files) - 17:32, 11 April 2015
- {{wikipedia::Payment Card Industry Data Security Standard}} [[Category:Data security standards]]448 bytes (59 words) - 21:07, 21 June 2016
- ==XML and internal data escaping== Escaping is required in internal data representations, too. For example, incorrectly escaped strings in XML could3 KB (534 words) - 22:18, 10 August 2016
- ==Insecure data transfer== Data transferred unencrypted can be sniffed. This can not only give an attacker4 KB (686 words) - 22:36, 10 August 2016
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
- ...tional security implications of asymmetric access to and use of biological data ...cribes security implications of asymmetric access to and use of biological data.47 KB (6,188 words) - 18:25, 18 June 2019
- ...RFI for evaluating cannabis testing LIMS vendors/LIMS: Software security, data integrity, and related policies}}172 bytes (24 words) - 22:49, 3 January 2024
- ==LIMS: Software security, data integrity, and related policies== ===Internal security policy and procedures===2 KB (277 words) - 22:50, 3 January 2024
- ...tps://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, ...event it from being obscured by new data, keeping both the old and current data available for review.<br /> <br /><hr style="width:95%; margin: auto;"22 KB (2,767 words) - 00:56, 4 January 2024
Page text matches
- |title_full = Understanding cybersecurity frameworks and information security standards: A review and comprehensive overview ...tandards demonstrate whether an [[information management]] system can meet security requirements through a range of best practices and procedures. A range of s94 KB (12,503 words) - 17:15, 16 March 2023
- ..._full = An overview of data warehouse and data lake in modern enterprise data management |journal = ''Big Data and Cognitive Computing''130 KB (18,351 words) - 16:15, 3 May 2023
- |title_full = Multilevel classification of security concerns in cloud computing ...amic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.56 KB (7,679 words) - 18:43, 6 October 2021
- ===2.2 Security in the cloud=== ...=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019 |accessdate=28 July 2023}}</ref>60 KB (7,949 words) - 20:10, 16 August 2023
- ...o detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is c ...imal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit136 KB (18,556 words) - 18:40, 6 October 2021
- ...oals, with the effective use of resources: people, time, money, equipment, data, and [[information]]. The fundamental goals of laboratory work haven’t ch ...ntion in their application and management to protect electronic laboratory data, ensure that it can be effectively used, and ensure that the systems and pr218 KB (34,907 words) - 16:00, 29 March 2024
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- |title_full = Cross-border data transfer regulation in China ...Protection Law, demonstrates China's great willingness towards a stronger data protection regime and more flexible regulatory mechanism.68 KB (9,682 words) - 19:21, 31 July 2021
- |title_full = Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges ...nd giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectiv44 KB (6,151 words) - 18:54, 14 October 2019
- |title_full = Security and privacy in cloud-based eHealth systems ...re on different approaches and mechanisms used in [[eHealth]] to deal with security and privacy issues. Some of these approaches have strengths and weaknesses.60 KB (8,281 words) - 20:49, 19 September 2021
- ...-MASS: An ISO 8000-61-based data quality management methodology for sensor data .... This paper introduces DAQUA-MASS, a methodology based on ISO 8000-61 for data quality management in sensor networks. The methodology consists of four ste90 KB (13,287 words) - 18:28, 25 November 2019
- |title_full = A security review of local government using NIST CSF: A case study ...automation and control systems, Part 3-3: System security requirements and security levels |work=ANSI/ISA-62443-3-3 (99.03.03)-2013 |author=ISA |date=12 August53 KB (7,071 words) - 18:38, 6 October 2021
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
- '''Keywords''': cybersecurity, ethics, smart information systems, big data ...Security Base,” whose mission is to provide security to critical national security assets.<ref name="SingerCyber14" />67 KB (9,997 words) - 21:00, 19 September 2021
- ==Security== ...y inasmuch as it specifically addresses electronic information and related security measures.17 KB (2,436 words) - 23:00, 10 February 2022
- ...studied articles. Our results also showed that publications on [[physical security]] account for only one percent of the literature, and research in this area ...journal |title=The ABC of ransomware protection |journal=Computer Fraud & Security |author=Furnell, S.; Emm, D. |volume=2017 |issue=10 |pages=5–11 |year=20156 KB (6,952 words) - 18:28, 5 May 2020
- ...of its decentralization feature combined with [[Information security|data security]] and [[Information privacy|privacy]], while cloud provides solutions to th ...r the healthcare industry to design and develop a [[Information management|data management]] system for better patient care.128 KB (16,620 words) - 15:45, 2 November 2021
- |title_full = Big data management for cloud-enabled geological information services ...ents the application development opportunities and technical trends of big data management in CEGIS, including collection and preprocessing, storage and ma69 KB (9,778 words) - 22:40, 20 February 2018
- Template:Choosing and Implementing a Cloud-based Service for Your Laboratory/RFI questions for MSSPs=Appendix 3. An RFI/RFP for evaluating managed security services providers (MSSPs)= What follows are a carefully selected set of "questions" for managed security services providers (MSSPs) posed as, well, requests for information. This c27 KB (3,891 words) - 20:41, 16 August 2023
- |title_full = Data management challenges for artificial intelligence in plant and agricultural ...identifies and discusses eight key challenges in [[Information management|data management]] that must be addressed to further unlock the potential of AI i148 KB (20,856 words) - 16:28, 29 April 2024