Search Results - technology+classifications+%3e+computers%2c+electronics+%26+software+%3e+cybersecurity

3 Results Sort By:
Task Manager
Unmet Need:As personal medical information continues to be digitized, it is increasingly essential to implement safeguards for the protection of such information.Technology Overview:Inventors at Johns Hopkins have developed a digital survey software platform for touch-screen data entry forms with tablet devices. The system is wirelessly synchronized...
Published: 6/28/2024   |   Inventor(s): David Newman-Toker
Keywords(s):  
Category(s): Technology Classifications > Computers, Electronics & Software > Cybersecurity, Technology Classifications > Computers, Electronics & Software > Electronic Medical Records, Technology Classifications > Computers, Electronics & Software > Healthcare IT
Architecture for Network Attack Resilient Intrusion Tolerant SCADA
Unmet Need:Today’s SCADA (supervisory control and data acquisition)systems use fault-tolerance techniques to remain available even when parts of the system fail. The systems can be restored after a few hours of downtime during a non-critical time, a tolerance that is considered acceptable today.However, as malicious attacks become more prevalent, SCADA...
Published: 6/27/2024   |   Inventor(s): Yair Amir, Thomas Tantillo, Amy Babay
Keywords(s): Computer and Network Systems, Computer Software, Computing; Calculating; Counting, Database Management Software, Electrical Digital Data Processing, Physics
Category(s): Technology Classifications > Computers, Electronics & Software > Healthcare IT, Technology Classifications > Computers, Electronics & Software, Technology Classifications > Computers, Electronics & Software > Cybersecurity
Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing
An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists...
Published: 6/27/2024   |   Inventor(s): Roberto Tamassia, Michael Goodrich
Keywords(s): Arrangements for Secret or Secure Communication, Computing; Calculating; Counting, Electric Communication Technique, Electrical Digital Data Processing, Electricity, Physics, Transmission of Digital Information
Category(s): Technology Classifications > Computers, Electronics & Software > Cybersecurity, Technology Classifications > Computers, Electronics & Software > Healthcare IT, Technology Classifications > Industrial Tech > Energy, Infrastructure & Environment, Technology Classifications > Computers, Electronics & Software, Technology Classifications > Industrial Tech
2017 - 2022 © Johns Hopkins Technology Ventures. All Rights Reserved. Powered by Inteum