World Congress on Internet Security (WorldCIS-2014) 2014
DOI: 10.1109/worldcis.2014.7028174
|View full text |Cite
|
Sign up to set email alerts
|

Component for 3D printing provenance framework: Security properties components for provenance framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…However, there is no clear understanding between security clearance levels (Top Secret, Secret, Private and Public) and the meta data that needs to be share about the records themselves. Fadhel et al (2014), authors discussed the importance of security and how record provenance is an essential part for protecting records. Authors related general computer security principles to conventional archival records.…”
Section: Information Security Prospectivementioning
confidence: 99%
See 4 more Smart Citations
“…However, there is no clear understanding between security clearance levels (Top Secret, Secret, Private and Public) and the meta data that needs to be share about the records themselves. Fadhel et al (2014), authors discussed the importance of security and how record provenance is an essential part for protecting records. Authors related general computer security principles to conventional archival records.…”
Section: Information Security Prospectivementioning
confidence: 99%
“…In this context, it means validating both parties which are the sender and receiver of the information. Also, verifying claimed identity to ensure communication and information are genuine (Alketbi et al, 2018;Lemieux, 2016;Fadhel et al, 2014). Confidentiality.…”
Section: Framework Factor: Security Principlesmentioning
confidence: 99%
See 3 more Smart Citations