Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- ...tps://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, ...event it from being obscured by new data, keeping both the old and current data available for review.<br /> <br /><hr style="width:95%; margin: auto;"22 KB (2,767 words) - 00:56, 4 January 2024
- This category is dedicated to any standards related to data security and encryption.7 members (0 subcategories, 0 files) - 17:32, 11 April 2015
- {{wikipedia::Payment Card Industry Data Security Standard}} [[Category:Data security standards]]448 bytes (59 words) - 21:07, 21 June 2016
- ==XML and internal data escaping== Escaping is required in internal data representations, too. For example, incorrectly escaped strings in XML could3 KB (534 words) - 22:18, 10 August 2016
- ==Insecure data transfer== Data transferred unencrypted can be sniffed. This can not only give an attacker4 KB (686 words) - 22:36, 10 August 2016
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
- ...tional security implications of asymmetric access to and use of biological data ...cribes security implications of asymmetric access to and use of biological data.47 KB (6,188 words) - 18:25, 18 June 2019
- ...RFI for evaluating cannabis testing LIMS vendors/LIMS: Software security, data integrity, and related policies}}172 bytes (24 words) - 22:49, 3 January 2024
- ==LIMS: Software security, data integrity, and related policies== ===Internal security policy and procedures===2 KB (277 words) - 22:50, 3 January 2024
Page text matches
- |title_full = Understanding cybersecurity frameworks and information security standards: A review and comprehensive overview ...tandards demonstrate whether an [[information management]] system can meet security requirements through a range of best practices and procedures. A range of s94 KB (12,503 words) - 17:15, 16 March 2023
- |title_full = Multilevel classification of security concerns in cloud computing ...amic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.56 KB (7,679 words) - 18:43, 6 October 2021
- ..._full = An overview of data warehouse and data lake in modern enterprise data management |journal = ''Big Data and Cognitive Computing''130 KB (18,351 words) - 16:15, 3 May 2023
- ===2.2 Security in the cloud=== ...=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019 |accessdate=28 July 2023}}</ref>60 KB (7,949 words) - 20:10, 16 August 2023
- ...o detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is c ...imal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit136 KB (18,556 words) - 18:40, 6 October 2021
- |title_full = Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges ...nd giving clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectiv44 KB (6,151 words) - 18:54, 14 October 2019
- |title_full = Cross-border data transfer regulation in China ...Protection Law, demonstrates China's great willingness towards a stronger data protection regime and more flexible regulatory mechanism.68 KB (9,682 words) - 19:21, 31 July 2021
- ...oals, with the effective use of resources: people, time, money, equipment, data, and [[information]]. The fundamental goals of laboratory work haven’t ch ...ntion in their application and management to protect electronic laboratory data, ensure that it can be effectively used, and ensure that the systems and pr218 KB (34,907 words) - 16:00, 29 March 2024
- Journal:Registered data-centered lab management system based on data ownership security architecture...= Registered data-centered lab management system based on data ownership security architecture ...study indicate that the proposed strategy is secure and efficient for lab data sharing across domains.61 KB (8,423 words) - 21:32, 31 July 2023
- |title_full = Security and privacy in cloud-based eHealth systems ...re on different approaches and mechanisms used in [[eHealth]] to deal with security and privacy issues. Some of these approaches have strengths and weaknesses.60 KB (8,281 words) - 20:49, 19 September 2021
- |title_full = A security review of local government using NIST CSF: A case study ...automation and control systems, Part 3-3: System security requirements and security levels |work=ANSI/ISA-62443-3-3 (99.03.03)-2013 |author=ISA |date=12 August53 KB (7,071 words) - 18:38, 6 October 2021
- |title_full = Moving ERP systems to the cloud: Data security issues ...maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more ca41 KB (5,757 words) - 21:44, 6 February 2018
- ==Security== ...y inasmuch as it specifically addresses electronic information and related security measures.17 KB (2,436 words) - 23:00, 10 February 2022
- '''Keywords''': cybersecurity, ethics, smart information systems, big data ...Security Base,” whose mission is to provide security to critical national security assets.<ref name="SingerCyber14" />67 KB (9,997 words) - 21:00, 19 September 2021
- ...studied articles. Our results also showed that publications on [[physical security]] account for only one percent of the literature, and research in this area ...journal |title=The ABC of ransomware protection |journal=Computer Fraud & Security |author=Furnell, S.; Emm, D. |volume=2017 |issue=10 |pages=5–11 |year=20156 KB (6,952 words) - 18:28, 5 May 2020
- ...-MASS: An ISO 8000-61-based data quality management methodology for sensor data .... This paper introduces DAQUA-MASS, a methodology based on ISO 8000-61 for data quality management in sensor networks. The methodology consists of four ste90 KB (13,287 words) - 18:28, 25 November 2019
- Template:Choosing and Implementing a Cloud-based Service for Your Laboratory/RFI questions for MSSPs=Appendix 3. An RFI/RFP for evaluating managed security services providers (MSSPs)= What follows are a carefully selected set of "questions" for managed security services providers (MSSPs) posed as, well, requests for information. This c27 KB (3,891 words) - 20:41, 16 August 2023
- ...of its decentralization feature combined with [[Information security|data security]] and [[Information privacy|privacy]], while cloud provides solutions to th ...r the healthcare industry to design and develop a [[Information management|data management]] system for better patient care.128 KB (16,620 words) - 15:45, 2 November 2021
- ...uitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app develop ...y education, app permission, mobile security awareness, user privacy, user security, sensor attacks89 KB (12,939 words) - 20:08, 26 November 2019
- ==2. Standards and security in the cloud== ...ecurity-leaders |title=Cloud is safer than on-premise say that majority of security leaders |publisher=Continuity Central |date=04 September 2019 |accessdate=249 KB (6,378 words) - 20:45, 16 August 2023