• No results found

identity and integrity

Struggling to be Fit: Identity, Integrity, and the Law

Struggling to be Fit: Identity, Integrity, and the Law

... of identity and physical integrity can be key to meaning- making in these contexts, and more generally so regarding respect for the ...to identity and its importance to the person. Identity is ...

10

KLF2 and KLF4 control endothelial identity and vascular integrity

KLF2 and KLF4 control endothelial identity and vascular integrity

... Another key finding relates to the breadth of the endothelial transcriptome under control of KLF2/4. It is hypothesized that, while the genome consists of approximately 20,000 genes (28), most cells express approximately ...

10

Data Integrity Checking In Public Cloud and Data Uploading Using Identity Based Proxy Oriented Data

Data Integrity Checking In Public Cloud and Data Uploading Using Identity Based Proxy Oriented Data

... data integrity checking (RDIC) enables a data storage server, says a cloud server, to prove to a verifier that it is actually storing a data owner’s data ...of identity-based (ID-based) RDIC protocol by ...

12

Body Integrity Identity Disorder (BIID): How Satisfied are Successful Wannabes

Body Integrity Identity Disorder (BIID): How Satisfied are Successful Wannabes

... Abstract: Background: People suffering from Body Integrity Identity Disorder feel the intensive wish for an amputation of one limb or another kind of handicap. Due to ethic and juristic reasons, the desired ...

11

Title: Identity-Based Integrity Verification using PDP in Multi Cloud Storage

Title: Identity-Based Integrity Verification using PDP in Multi Cloud Storage

... Data integrity is important thing in cloud ...and integrity checking is very important. Here we propose an Identity Based Distributed Provable Data Possession (ID-DPDP) protocol for multi-cloud ...

6

Apotemnophilia, body integrity identity disorder or xenomelia? Psychiatric and neurologic etiologies face each other

Apotemnophilia, body integrity identity disorder or xenomelia? Psychiatric and neurologic etiologies face each other

... anatomical identity, the time of onset being located during childhood, successful treatment being effected by mimicking of the desire, and finally, that paraphilic sexual arousal is obtained through fantasies of ...

11

State-of-the-Art Identity Integrity Safeguard Approach in e-Commerce

State-of-the-Art Identity Integrity Safeguard Approach in e-Commerce

... Motivated by the idea “Attack is the best form of defence”, cybercriminals should be misled, traced and penalised accordingly. In this paper, an intelligent state-of-the-art identity integrity safeguard ...

5

Gender Dysphoria and Body Integrity Identity Disorder: Similarities and Differences

Gender Dysphoria and Body Integrity Identity Disorder: Similarities and Differences

... other identity disorders, such as the Body Integrity Identity Disorder (BIID), because the connection with transsexuality is especially intriguing in these cases due to the percentage of BIID ...

6

Proxy Oriented Data Uploading and Dynamic Data Integrity Checking based On identity

Proxy Oriented Data Uploading and Dynamic Data Integrity Checking based On identity

... cryptography, identity-based public key cryptographyand remote data integrity checking in public ...the identity-based cryptography, identity- basedcryptography becomes efficient and ...study ...

5

Lymphatic regulator PROX1 determines Schlemm’s canal integrity and identity

Lymphatic regulator PROX1 determines Schlemm’s canal integrity and identity

... the integrity of SC ECs, except decreased densi- ties of transendothelial pores in SC ECs, depending on AHO with aging ...the integrity of SC ECs manifests increased numbers of mesenchymal cells, includ- ...

16

Identity Based Data Uploading on Proxy Oriented Data Integrity Checking  in Public Cloud

Identity Based Data Uploading on Proxy Oriented Data Integrity Checking  in Public Cloud

... data integrity checking in public cloud ...data integrity .checking and proxy originated data uploading on identity based in public cloud Using a bilinear pairing ripu- idc protocol is ...data ...

6

Code Regeneration Scheme for Data Integrity and Identity Based Data Uploading for Hospital Data's

Code Regeneration Scheme for Data Integrity and Identity Based Data Uploading for Hospital Data's

... With respect to the security concerns of the hospital organisation, in our proposed system model, we propose a identity based data uploading via proxies and code regeneration for providing the data ...

6

Program Integrity and the Implications of the Corporate Identity in Higher Education

Program Integrity and the Implications of the Corporate Identity in Higher Education

... Program Integrity sought accountability for the industry’s representations and performance, the Department’s rules would have been insufficient to reduce student need to borrow great amounts for tuition, and were ...

28

Body integrity identity disorder crosses culture: case reports in the Japanese and Chinese literature

Body integrity identity disorder crosses culture: case reports in the Japanese and Chinese literature

... Body integrity identity disorder (BIID) is a condition in which people do not perceive a part of their body as their own, which results in a strong desire for amputation or ...

5

Data Integrity And Data Uploading In Cloud With Identity Based Proxy Oriented Encryption

Data Integrity And Data Uploading In Cloud With Identity Based Proxy Oriented Encryption

... Present days many users store their significant data in cloud. To ensure that the security of the cloud stored data users need to encrypt the important data. The point of data security which has always been noteworthy ...

8

Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

... Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud ...

6

Secure Online Encryption and Integrity Checking With Partial Data Identity Outsourcing

Secure Online Encryption and Integrity Checking With Partial Data Identity Outsourcing

... to use cloud storage due to its flexible and secure services. As more number of users are adopting cloud data services different types of threats are troubling them. In such scenario available Cloud Service Provider’s ...

8

Title: REMOTE DATA INTEGRITY CHECK AND DATA UPLOADING USING CLIENT AND SERVER PROXIES

Title: REMOTE DATA INTEGRITY CHECK AND DATA UPLOADING USING CLIENT AND SERVER PROXIES

... the identity based cryptography has become more effective due to the property that it avoid the certificate management, large and large experts are suited to study identity 0based proxy ...

8

Privacy Preserving Public Analyze for Mundane Information in Cloud

Privacy Preserving Public Analyze for Mundane Information in Cloud

... an incipient conception for identity privacy with efficient utilizer revocation in cloud computing environment. This paper category the methodologies in the literature as encryption predicated methods, access ...

5

SURVEY ONPRIVACY PRESERVING PUBLIC AUDITING MECHANISM FOR SHARED DATA IN CLOUD COMPUTING ENVIRONMENT

SURVEY ONPRIVACY PRESERVING PUBLIC AUDITING MECHANISM FOR SHARED DATA IN CLOUD COMPUTING ENVIRONMENT

... In Cloud Computing Environment, data is stored and shared among multiple users. It is very important as well as very challenging job to maintain the integrity of the data. The data stored in the cloud is ...

6

Show all 10000 documents...

Related subjects