Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm

Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De
{"title":"Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm","authors":"Rajdeep Chowdhury, Jenifar Khan, Subham Sengupta, Saswata Dasgupta, S. Datta, Mallika De","doi":"10.1145/2909067.2909094","DOIUrl":null,"url":null,"abstract":"Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Women In Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2909067.2909094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Network Security has become imperative in the contemporary scenario and subsequently an assortment of modus operandi is being espoused to evade it. Network administrators need to adhere with latest advancement in both hardware and software field to prevent user data from malicious intrusions. The formulated paper outlines a cryptographic algorithm based on Time Integrated Seed modus operandi Engendering Elements at bay and focusing on Dynamic Referencing Data Warehouse employing the identical concept amid its functionality. An amalgamation would endow with a proficient and prearranged approach of amassing data with stringent security modus operandi, with effective deployment of all obtainable space. The incorporation of the novel cryptographic algorithm with the Dynamic Referencing Data Warehouse would ensure performance enhancement in course of action. The pertinent employment of the formulated work could be ensured in a variety of organizations where accrual of cosseted data is of extreme enormity, which would include educational organizations, corporate houses, medical establishments, private establishments and so on and so forth.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
采用提出的基于时间集成种子的元素生成密码算法的动态引用数据仓库
网络安全已经成为当代场景的当务之急,随后各种各样的操作方式被支持以逃避它。网络管理员需要紧跟硬件和软件领域的最新进展,以防止用户数据受到恶意入侵。本文概述了一种基于时间集成种子操作方式的加密算法,并着重于动态引用数据仓库,在其功能中采用相同的概念。合并将以一种熟练和预先安排的方式,以严格的安全操作方式收集数据,并有效地部署所有可用的空间。将新的加密算法与动态引用数据仓库相结合,可以保证在操作过程中性能的提高。可以确保在各种组织中适当地使用拟定的工作,这些组织中累积的受保护数据极其巨大,包括教育组织、公司、医疗机构、私人机构等等。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Handling Uncertainty in Linguistics Using Probability Theory Secure Sum Computation Using Homomorphic Encryption Skyline Computation for Big Data Missing Value Imputation in Medical Records for Remote Health Care A Review of Wireless Charging Nodes in Wireless Sensor Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1