2020
DOI: 10.32604/cmc.2020.06745
|View full text |Cite
|
Sign up to set email alerts
|

Digital Continuity Guarantee Approach of Electronic Record based on Data Quality Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 12 publications
0
21
0
1
Order By: Relevance
“…Denial of service (DoS) attack is a method used to disrupt legitimate users' access to the target network or website resources [33][34][35]. Usually this is achieved by overloading a target with a large amount of traffic (usually a web server), or by sending malicious requests that cause the target resource to malfunction or completely collapse [36][37][38][39][40][41].…”
Section: Security Analysismentioning
confidence: 99%
“…Denial of service (DoS) attack is a method used to disrupt legitimate users' access to the target network or website resources [33][34][35]. Usually this is achieved by overloading a target with a large amount of traffic (usually a web server), or by sending malicious requests that cause the target resource to malfunction or completely collapse [36][37][38][39][40][41].…”
Section: Security Analysismentioning
confidence: 99%
“…Scholars around the world have made some attempts, such as input-output model [1][2][3], system dynamics model [4][5][6], Kuznets curve [7][8][9][10][11], ridge regression model [12][13][14][15], Vertical Auto-regression model [16][17][18][19], and computable general equilibrium assessment [20][21][22][23][24][25]. One of the most widely used methods is the Kuznets curve, which reflects the inverted U-shape between economy and environment.…”
Section: Related Workmentioning
confidence: 99%
“…( 6). ln Y2 it ¼ 29:7744 ln GDP it À 1:38441 ln GDP 2 it À 0:35741 ln Dens it À 0:6171Urba it þ 0:4509Indu it À 0:1172 ln FDI it À 0:1595 ln Tech it À 148:9527…”
Section: Panel Regression Analysisunclassified
“…Wang et al [34] proposed a data integrity scheme for cloud-IoT data by blockchain and bilinear mapping, which introduced provable update mechanism to support dynamic IoT data. Wang et al [35,36] proposed concrete private blockchain-based schemes which also realized client's privacy preserving. To address the centralized problem of TPA, Dong et al [37] presented a secure data integrity checking scheme based on consortium blockchain, which also designed a punishment mechanism to punish the TPA who failed to send the audit result in time.…”
Section: Related Workmentioning
confidence: 99%