The above figure elucidates the basic
transformations among the data objects taken from their origin to the current
state. Perhaps, the same is in line with security fundamentals CIA. Vi and Vj
and Vn represent the versions of data objects up on modifications over time.
Ti, Tj and Tn are the corresponding transformations with respect to versions.
Subscribe to:
Post Comments (Atom)
The lineage of Data Objects with transformations on CIA: C- confidentiality I- Integrity A- Availability.
The above figure elucidates the basic transformations among the data objects taken from their origin to the current state. Perha...

-
Abstract — The developments in the information technology has led the modern world to rely on the internet for digital information. Peo...
-
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and volumi...
-
Estimating and attempting to overcome congestion in high radix topologies that use global adaptive routing decisions will have a great impa...
No comments:
Post a Comment