Trusted digital repositories in context: definitions, diagnoses, and directions for better practice

The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.

Подобные документы

  • The outlook of the digital divide factors influencing consumer adoption of smart city solutions. The digital divide in the United States of America: Americans without access to high-speed Internet service. Consumer adoption of smart city solutions.

    статья, добавлен 28.06.2021

  • Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.

    книга, добавлен 08.03.2014

  • Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.

    статья, добавлен 09.12.2024

  • Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.

    статья, добавлен 27.06.2016

  • The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.

    статья, добавлен 25.06.2024

  • Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.

    книга, добавлен 08.03.2014

  • Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.

    статья, добавлен 01.12.2017

  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация, добавлен 28.12.2013

  • A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.

    книга, добавлен 08.03.2014

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.

    статья, добавлен 19.03.2024

  • Функциональные требования концепции персонификации в компаниях. Перспективы формирования инструментов digital-аналитики для определения возможностей развития системы. Проектирование технологической архитектуры системы. Описание интерфейса программы.

    дипломная работа, добавлен 09.08.2018

  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    книга, добавлен 08.03.2014

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие, добавлен 08.03.2014

  • Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.

    книга, добавлен 08.03.2014

  • Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.

    материалы конференции, добавлен 08.03.2014

  • Огляд особливостей використання та створення цифрової розповіді (digital storytelling) як однієї з освітніх медійних технологій. Опис технології сторітеллінгу, а також подання різних класифікацій цифрових розповідей та алгоритму роботи над їх створенням.

    статья, добавлен 11.07.2018

  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    курсовая работа, добавлен 07.03.2016

  • Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.

    статья, добавлен 16.02.2016

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.

    методичка, добавлен 11.10.2014

  • Conceptualization of the virtual phenomenon as an environment in which the transformation of knowledge takes place. Analysis of the mechanism of vergence as a factor that ensures the synchrony of processes and phenomena in imaginary and actual realities.

    статья, добавлен 13.05.2024

  • Изучение информационной системы отдела кадров вуза и рассмотрение средств защиты системы. Создание модели отдела с помощью экспертной системы Digital Security Office для выявления угроз безопасности и поиска дальнейших решений по их устранению.

    статья, добавлен 23.03.2018

  • The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".

    статья, добавлен 25.06.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.