Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,037,518 papers from all fields of science
Search
Sign In
Create Free Account
Data security
Known as:
Secure information
Data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ATP Electronics
Application security
Backup
Base One Foundation Component Library (BFC)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
C. Esposito
,
A. D. Santis
,
G. Tortora
,
Henry Chang
,
Kim-Kwang Raymond Choo
IEEE Cloud Computing
2018
Corpus ID: 4566978
One particular trend observed in healthcare is the progressive shift of data and services to the cloud, partly due to convenience…
Expand
Highly Cited
2017
Highly Cited
2017
Blockchain Based Data Integrity Service Framework for IoT Data
Bin Liu
,
X. Yu
,
Shiping Chen
,
Xiwei Xu
,
Liming Zhu
IEEE International Conference on Web Services…
2017
Corpus ID: 4699120
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications because of the inherently…
Expand
Review
2016
Review
2016
Towards Achieving Data Security with the Cloud Computing Adoption Framework
V. Chang
,
M. Ramachandran
IEEE Transactions on Services Computing
2016
Corpus ID: 1024448
Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states…
Expand
Review
2014
Review
2014
Data Security and Privacy in Cloud Computing
Yunchuan Sun
,
Junsheng Zhang
,
Yongping Xiong
,
Guangyu Zhu
Int. J. Distributed Sens. Networks
2014
Corpus ID: 13213544
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes…
Expand
Review
2010
Review
2010
Data security and privacy in wireless body area networks
Ming Li
,
Wenjing Lou
,
K. Ren
IEEE wireless communications
2010
Corpus ID: 2520216
The wireless body area network has emerged as a new technology for e-healthcare that allows the data of a patient's vital body…
Expand
Highly Cited
2009
Highly Cited
2009
Ensuring data storage security in Cloud Computing
Rampal Singh
,
Sawan Kumar
,
Shani Kumar Agrahari
International Workshop on Quality of Service
2009
Corpus ID: 9689759
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions…
Expand
Highly Cited
2009
Highly Cited
2009
On the Foundations of Quantitative Information Flow
Geoffrey Smith
Foundations of Software Science and Computation…
2009
Corpus ID: 6680444
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow…
Expand
Highly Cited
2006
Highly Cited
2006
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
K. Ren
,
Wenjing Lou
,
Yanchao Zhang
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 5890157
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs…
Expand
Highly Cited
2004
Highly Cited
2004
The HIPAA-potamus in health care data security
Rebecca T. Mercuri
CACM
2004
Corpus ID: 34650506
Regulations intended to improve health care data access have created new security risks along with headaches for patients and…
Expand
Highly Cited
1999
Highly Cited
1999
Towards a taxonomy of intrusion-detection systems
Hervé Debar
,
M. Dacier
,
A. Wespi
Comput. Networks
1999
Corpus ID: 2133175
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE