Secure Information Through a Replicated Architecture

2021 ◽  
pp. 639-649
Author(s):  
Judith N. Froscher
Keyword(s):  

Information sharing among the associations is a general development in a couple of zones like business headway and exhibiting. As bit of the touchy principles that ought to be kept private may be uncovered and such disclosure of delicate examples may impacts the advantages of the association that have the data. Subsequently the standards which are delicate must be secured before sharing the data. In this paper to give secure information sharing delicate guidelines are bothered first which was found by incessant example tree. Here touchy arrangement of principles are bothered by substitution. This kind of substitution diminishes the hazard and increment the utility of the dataset when contrasted with different techniques. Examination is done on certifiable dataset. Results shows that proposed work is better as appear differently in relation to various past strategies on the introduce of evaluation parameters.


Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


2015 ◽  
Vol 4 (1) ◽  
pp. 11-18
Author(s):  
R. Kanimozhi ◽  
V. Sripriya ◽  
R. Priyadharshini ◽  
R. Meera ◽  
T. Abirami
Keyword(s):  

2002 ◽  
Vol 37 (1) ◽  
pp. 81-92 ◽  
Author(s):  
Kohei Honda ◽  
Nobuko Yoshida

OP-Journal ◽  
2021 ◽  
Author(s):  
Genevieve Westacott ◽  
Kirsten Vallmurr ◽  
Michael Schütz

AbstractData transfer has been forced to evolve as digital technologies are implemented throughout various aspects of the healthcare system. Despite the uniqueness of both the geography and the population of Queensland, information exchange and data communication has continued to follow this evolutionary trend. There have been a number of different health reforms designed to integrate digital innovations and allow critical data and information to be shared with the appropriate health professionals when necessary. Strict healthcare legislation has been navigated and to provide newly upgraded technologies and processes while maintaining privacy, confidentiality and security standards. A large portion of the digital revolution has been the implementation of the national run project, the My Health Record and the state run project, the Integrated Electronic Medical Record. Both are platforms that allow secure information exchange allowing patients to have improved quality of care. To maintain the steady progress, both the state and federal governments have developed strategies and visions to help provide guidance and direct for ongoing and future digital projects. They also outline areas that require further advancements to ensure Queensland is delivering equitable, high quality healthcare.


Author(s):  
K. Praghash ◽  
Ch. Vidyadhari ◽  
G. NirmalaPriya ◽  
Rajan Cristin

2013 ◽  
Vol 846-847 ◽  
pp. 1644-1647
Author(s):  
Xiao Le Li ◽  
Ying Wen ◽  
Ming Weng

Based on comprehensive analysis on security requirements of information transmission, security primitive is generated by automatic tool in asymmetric key cryptosystem, and improved with addition of compositional factors. And then, formal processes of secure information transmission are constructed with composition method. Formal analysis shows that, secrecy, integrity, availability, controllability, non-repudiation and identifiability during information transmission can be insured by this architecture, as a common framework for development of various application systems in digital campus from the viewpoint of information security.


Sign in / Sign up

Export Citation Format

Share Document