Authenticity And Integrity
Mostrando 1-10 de 10 artigos, teses e dissertações.
-
1. Preservação digital: autenticidade e integridade de documentos em bibliotecas digitais de teses e dissertações / Digital preservation: authenticity and integrity of documents in digital libraries of theses and dissertations.
Os avanços tecnológicos impõem um grande desafio para a preservação do patrimônio digital. Além de garantir a longevidade e acessibilidade dos documentos, é necessário mantê-los autênticos e íntegros para que os usuários confiem neles como fonte de informação e objeto de estudo. Instituições guardiãs precisam assumir a preservação de suas
Publicado em: 2010
-
2. Algoritmos de autenticação de mensagens para redes de sensores. / Message authentication algorithms for wireless sensor networks.
Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This
Publicado em: 2010
-
3. EdifÃcios novos em sÃtios histÃricos: anÃlise dos impactos sobre a autenticidade e integridade do patrimÃnio construÃdo
The city is a human artefact in permanent transformation. The task of building and rebuilding the urban environment puts at risk the conservation of built heritage and a group of values and knowledge of ancient inhabitants. Facing the conflict between the change in urban structures and the need to preserve peopleâs history and identity, integrated urban con
Publicado em: 2009
-
4. Middleware seguro para redes de sensores sem fio
There is a variety of application scenarios in wireless sensor networks such as medical monitoring, military, home and office security, agriculture and so on. These applications deal with Wireless Sensor Networks (WSNs) odd particularities such as limited power and computational capacities, hardware heterogeneity, low bandwidth, dynamic topology and scalabil
Publicado em: 2009
-
5. A cryptographic approach to achieve authenticity and integrity in medical images. / Abordagem criptográfica para integridade e autenticidade em imagens médicas.
Cada vez mais, a infra-estrutura de segurança está assumindo um lugar de destaque na área de saúde, para garantir fatores críticos como confidencialidade, autenticidade, integridade, irretratabilidade e auditoria. Em particular, a integridade e a autenticidade de imagens médicas são fatores bastante críticos, na medida em que fornecem mecanismos para
Publicado em: 2007
-
6. A APLICAÇÃO DE PROTOCOLOS CRIPTOGRÁFICOS NA GESTÃO DE DOCUMENTOS ELETRÔNICOS DE UMA SECRETARIA ACADÊMICA: ESTUDO DE CASO DA SOCIESC
The advances of the technologies of information and communication have intensified the relation between people and organizations through the computer. The next great challenge is the use of the electronic documents with the same safety and reliability attributed to paper documents. Authenticity, integrity, not-repudiate and not retroactive are the attributes
Publicado em: 2005
-
7. Proposta de um modelo de seguranÃa para VPNs na interligaÃÃo de redes corporativas
A Virtual Private Network - VPN is a protected connection, built for the private use of the enterprise, over a shared public network. A VPN uses security protocols, cryptography technologies and authentication to guarantee characteristics of a private and dedicated network to enterprises that use a not-trustworthy infrastructure, as the Internet, for interco
Publicado em: 2004
-
8. A prova obtida por meio eletrônico / The electronic evidence
The evidence collected through the internet is an important tool currently available to any litigant in a lawsuit. The technological development characteristic of the communication era, provides us access to several computerized facilities. These facilities are extremely important to the online market, as well as to all acts of law that take place online. Th
Publicado em: 2003
-
9. Secure and Low Cost Virtual Connection Under Linux / Conectividade virtual segura e de baixo custo sob Linux
The business environment requires constant collaboration, between people and offices geographically spreaded. The corporative market has one more option for real time data transmission: the private network communications based on IP protocol. The VPN Virtual Private Network stands for the most suitable solution to reduction of costs, fundamental for small co
Publicado em: 2003
-
10. Molecular cloning of human protein 4.2: a major component of the erythrocyte membrane.
Protein 4.2 (P4.2) comprises approximately 5% of the protein mass of human erythrocyte (RBC) membranes. Anemia occurs in patients with RBCs deficient in P4.2, suggesting a role for this protein in maintaining RBC stability and integrity. We now report the molecular cloning and characterization of human RBC P4.2 cDNAs. By immunoscreening a human reticulocyte