Search results
From LIMSWiki
Jump to navigationJump to search
- |title_full = A view of programming scalable data analysis: From clouds to exascale ...the main challenges to be addressed and solved for implementing innovative data analysis applications on exascale systems currently are.88 KB (12,480 words) - 18:40, 6 October 2021
- ...Informatics: A health informatics framework for verifiable and explainable data analysis ...tion, and servicing and processing changes throughout the lifecycle of the data management process. This is necessary in certain events, such as when the s75 KB (11,590 words) - 16:25, 29 April 2024
- ...uitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app develop ...y education, app permission, mobile security awareness, user privacy, user security, sensor attacks89 KB (12,939 words) - 20:08, 26 November 2019
- |title_full = Health data privacy through homomorphic encryption and distributed ledger computing: An ...geographical proximity to European Union (EU) member states, the [[General Data Protection Regulation]] (GDPR) may impose additional obligations.91 KB (12,825 words) - 19:20, 7 February 2023
- |title_full = Risk assessment for scientific data |journal = ''Data Science Journal''93 KB (12,315 words) - 20:39, 19 September 2021
- ==2. Standards and security in the cloud== ...ecurity-leaders |title=Cloud is safer than on-premise say that majority of security leaders |publisher=Continuity Central |date=04 September 2019 |accessdate=249 KB (6,378 words) - 20:45, 16 August 2023
- ...ogy, and standardization protocols, as well as [[Information security|data security]] and [[Information privacy|privacy]] protection. ...ecurity is ensured by adopting corresponding policies for data storage and data access. Privacy protection complies with laws and regulations and de-identi80 KB (10,705 words) - 17:50, 28 June 2023
- ...= The challenges of data quality and data quality assessment in the big data era |journal = ''Data Science Journal''43 KB (6,155 words) - 23:31, 8 August 2016
- ...ove their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats. ...=2019 |accessdate=03 March 2020}}</ref> Moreover, 79% of chief information security officers (CISOs) in the banking sector believe that cybercriminals have bec75 KB (9,816 words) - 19:15, 27 October 2020
- |title_full = Secure data outsourcing in presence of the inference problem: Issues and directions ...d emerging research on privacy and confidentiality concerns in cloud-based data outsourcing and pinpoint potential issues that are still unresolved.62 KB (8,751 words) - 16:40, 7 April 2021
- ...gement, security management, enterprise management, cloud communication, [[data analysis]], media management, container and [[middleware]] management, deve ...n on [https://www.alibabacloud.com/help/en/dataworks/user-guide/overview-6 data integration] for more details. Alibaba also discusses hybrid integration of30 KB (4,014 words) - 22:49, 28 February 2024
- |title_full = Named data networking for genomics data management and integrated workflows |journal = ''Frontiers in Big Data''85 KB (12,769 words) - 19:38, 22 March 2021
- |title_full = Developing a file system structure to solve healthcare big data storage and archiving problems using a distributed file system ...y for storing large amounts of data in the medical field. Furthermore, the security level of the system is extreme by use of static Internet Protocol (IP) addr79 KB (11,900 words) - 23:58, 11 April 2024
- ...aphy, complexity, and ease of implementation. Let's turn to the example of data retention requirements for businesses. Consider this software system requir ...nd enable protections that ensure the accurate and ready retrieval of that data throughout the records retention period.''</blockquote>51 KB (6,191 words) - 15:13, 21 March 2023
- ...ns-for-managed-security-services.html |title=RFP/RFI Questions for Managed Security Services: Sample MSSP RFP Template |publisher=Solutionary, Inc |date=Septem ...s-matrix-v4/ |format=xlsx |title=Cloud Controls Matrix v4 |publisher=Cloud Security Alliance |date=15 March 2021 |accessdate=14 August 2023}}</ref>30 KB (4,154 words) - 20:39, 16 August 2023
- ...le_full = Ten simple rules for maximizing the recommendations of the NIH data management and sharing plan ...ry 2023. The recommendations include a requirement for the submission of a data management and sharing plan (DMSP) with funding applications, and while no65 KB (9,385 words) - 16:33, 29 April 2024
- ...e field sensor lead to a potential attacker finding a way into operational data stores? If you discuss these and other potential situations, the organizati ...ecurity frameworks that guide the organization towards better security and data integrity.24 KB (3,255 words) - 20:12, 16 August 2023
- |title_full = Big data management for healthcare systems: Architecture, requirements, and implemen ...cases. The main contribution of this paper is proposing an extensible big data architecture based on both stream computing and batch computing in order to58 KB (8,235 words) - 18:27, 25 November 2019
- ...torage, database management, security management, enterprise management, [[data analysis]], scientific computing, container management, developer support, ...d-/ |title=Lab7 Systems Announces High-Performance Cloud For Genomic-Scale Data Management Built On IBM Cloud |work=BioSpace |author=Lab7 Systems, Inc |dat26 KB (3,627 words) - 20:26, 3 April 2024
- |title_full = Establishing reliable research data management by integrating measurement devices utilizing intelligent digital ...loped to convey [[metadata]] from research devices along with the produced data. In addition, a reactive digital twin implementation of a specific measurem119 KB (17,262 words) - 16:27, 29 April 2024