Big Data and cloud computing: innovation opportunities and challenges

C Yang, Q Huang, Z Li, K Liu, F Hu - International Journal of Digital …, 2017 - Taylor & Francis
Big Data has emerged in the past few years as a new paradigm providing abundant data
and opportunities to improve and/or enable research and decision-support applications with …

Formal models for computer security

CE Landwehr - ACM Computing Surveys (CSUR), 1981 - dl.acm.org
Efforts to build" secure" computer systems have now been underway for more than a
decade. Many designs have been proposed, some prototypes have been constructed, and a …

[图书][B] Non-functional requirements in software engineering

L Chung, BA Nixon, E Yu, J Mylopoulos - 2012 - books.google.com
Non-Functional Requirements in Software Engineering presents a systematic and pragmatic
approach tobuilding quality into'software systems. Systems must exhibit software quality …

[图书][B] Fundamentos de bases de datos

A Silberschatz, HF Korth, S Sudarshan, FS Pérez… - 2002 - academia.edu
• Bases de datos relacionales (Capítulos 4 al 7). El Capítulo 4 se centra en el lenguaje
relacional orientado al usuario de mayor influencia: SQL. El Capítulo 5 cubre otros dos …

A framework for analysis of data quality research

RY Wang, VC Storey, CP Firth - IEEE transactions on …, 1995 - ieeexplore.ieee.org
Organizational databases are pervaded with data of poor quality. However, there has not
been an analysis of the data quality literature that provides an overall understanding of the …

Systems and methods for secure transaction management and electronic rights protection

KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 6,363,488, 2002 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
23532729&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Big data security and privacy

E Bertino, E Ferrari - A comprehensive guide through the Italian database …, 2017 - Springer
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …

Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management

KL Ginter, VH Shear, FJ Spahn, DM Van Wie… - US Patent …, 2003 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
32601076&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Systems and methods for secure transaction management and electronic rights protection

KL Ginter, VH Shear, FJ Spahn, DM Van Wie - US Patent 6,389,402, 2002 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
23532729&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Analysis of the communication between colluding applications on modern smartphones

C Marforio, H Ritzdorf, A Francillon… - Proceedings of the 28th …, 2012 - dl.acm.org
Modern smartphones that implement permission-based security mechanisms suffer from
attacks by colluding applications. Users are not made aware of possible implications of …