Skip to main content

Home/ Groups/ CSIA 459
sarahterry

Shibboleth Authentication Request - 1 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source explains the history of biometrics and how biometrics have got to where they are now.
Gilbert Rivera

Secure, Dependable and High Performance Cloud Storage. - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The authors in the document provide technical details on securing data on the cloud. It shows guides system administrators on the use of Access Control Lists (ACLs), program scripting, and how to implement several methodologies and techniques to maintain a high level of security of data in the cloud. This is a very technical report but is helpful to show insight on how system administrators maintain a secure backbone in the cloud.
Gilbert Rivera

Data Migration from Grid to Cloud Computing - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this document the authors shows us the migration that business are taking from handling data from their grid to using cloud data storage services. This document focuses on how to use database libraries with data stored in the cloud. It provides guidance in using tools like SQL, Hadoop and HBase mapping. This item can be useful for business to access their databases from information stored in the cloud and can be very helpful.
Gilbert Rivera

Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Gilbert Rivera

Privacy Preserving Approaches in Cloud: a Survey - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography As the authors note, this paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud. This survey is quite useful because it shows information in several security methodologies involving cloud computing and data storage. It provides with several approaches to the auditing of these systems and ensuring that data stored is secured.
Gilbert Rivera

A Journey from floppy disk to cloud storage - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The author of this article discusses the evolution of data storage from floppy disks to the new cloud data storage. This is a quite informative item which shows us the first data storage hardware and backup stores, and how it evolved through time and also its contribution on the world of networking. It also describes cloud data storage, how it works and the future of cloud computing in networking.
Gilbert Rivera

EBSCOhost: Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
scott thomas

Biometric Technologies: Security, Legal, and Policy Implications - 0 views

  •  
    Advanced technology is a competitive advantage for the United States, and it must be used if the country is to win its war on terrorism. Biometric technologies-such as iris recognition, handgeometry, finger recognition, facial recognition, and voicerecognition-have substantial potential to improve national securityby providing a means to identify and verify people in manycontexts.
scott thomas

Biometrics: Weighing convenience and national security against your privacy - 0 views

  •  
    Panelists, Professor William Marshall, Professor Richard Pildes, Professor Ciara Torres-Spelliscy, Professor Edward Foley, Professor Richard Hasen, Edwin Bender, Laughlin McDonald, Professor Michael Kang, Professor James Lopach, Former Montana Supreme Court Justice Jim Regnier, Former Montana Supreme Court Justice W.
scott thomas

Automated biometrics-based personal identification - 1 views

  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
  •  
    Scott, this technology appears not to far away especially when it comes to biometrics/fingerprinting the last car dealership I worked at 4 years ago employed this for retrieving keys to test drive cars and the salespeople liked this a lot because we did not have to worry about keeping up with a key to unlock the key box before signing a car out to test drive. I mean you always got your finger with you and key log kept track of last known person with key so salespeople would not be charged for lost keys. Thanks.
  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
« First ‹ Previous 81 - 100 of 332 Next › Last »
Showing 20 items per page