data integrity verification

data integrity verification

The process of manually supervising data verification for internal consistency.
References in periodicals archive ?
SecureBridge protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
Take the data integrity verification for example, it is known that data integrity protection is necessary and has been an utmost important issue in building trusted storage system [2].
To solve this problem, [6] presented a data integrity verification scheme based on the RSA algorithm.
Combined with real-time data integrity verification, such as OCR reading, bar-code verification and database matching, the Axode 1080NEO provides quality inspection for printers and finishers of security documents, transactional documents and security labels.
This requires the solution to provide auditing features, data integrity verification and guaranteed delivery options.
Spectra[R] T-Finity tape libraries will provide the Blue Waters project with the ability to keep all near-line data accessible in an active repository, perform automated data integrity verification for the data store, and deliver high performance read/write rates of up to 2.
Keywords: Cloud storage, Data integrity verification, Energy-efficient, Assigning verification tasks
Aspera s comprehensive security protects clients sensitive documents with SSH authentication, AES-128 data encryption in transit and at rest, and data integrity verification for each transmitted block.
Modern tape storage solutions offer robust functionality and features such as LTFS support, proactive media health alerts and automated data integrity verification.
Many data integrity verification algorithms [3-10] have been proposed to check the correctness of data in the untrusted servers.
Built around that protocol, Aspera s software delivers data transfers that are up to 1000 times faster than traditional technologies, managed through an intuitive user interface, with real-time visual monitoring and bandwidth utilisation and sharing controls, and secured through sophisticated authentication, data encryption and data integrity verification.
Full browser ?