Open Access

Construction of data security protection model in archive informatization system based on deep learning

  
Mar 21, 2025

Cite
Download Cover

Alkhudhayr, F., Alfarraj, S., Aljameeli, B., & Elkhdiri, S. (2019, May). Information security: A review of information security issues and techniques. In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1-6). IEEE. Alkhudhayr F. Alfarraj S. Aljameeli B. Elkhdiri S. ( 2019 , May ). Information security: A review of information security issues and techniques . In 2019 2nd international conference on computer applications & information security (ICCAIS) (pp. 1 - 6 ). IEEE . Search in Google Scholar

Bertino, E., & Ferrari, E. (2017). Big data security and privacy. In A comprehensive guide through the Italian database research over the last 25 years (pp. 425-439). Cham: Springer International Publishing. Bertino E. Ferrari E. ( 2017 ). Big data security and privacy . In A comprehensive guide through the Italian database research over the last 25 years (pp. 425 - 439 ). Cham: Springer International Publishing . Search in Google Scholar

Zhang, D. (2018, October). Big data security and privacy protection. In 8th international conference on management and computer science (ICMCS 2018) (pp. 275-278). Atlantis Press. Zhang D. ( 2018 , October ). Big data security and privacy protection . In 8th international conference on management and computer science (ICMCS 2018) (pp. 275 - 278 ). Atlantis Press . Search in Google Scholar

Hajare, R., Hodage, R., Wangwad, O., Mali, Y., & Bagwan, F. (2021). Data Security in Cloud. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), 8(3), 240-245. Hajare R. Hodage R. Wangwad O. Mali Y. Bagwan F. ( 2021 ). Data Security in Cloud . International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) , 8 ( 3 ), 240 - 245 . Search in Google Scholar

Ahmadian, M., & Marinescu, D. C. (2018). Information leakage in cloud data warehouses. IEEE Transactions on Sustainable Computing, 5(2), 192-203. Ahmadian M. Marinescu D. C. ( 2018 ). Information leakage in cloud data warehouses . IEEE Transactions on Sustainable Computing , 5 ( 2 ), 192 - 203 . Search in Google Scholar

Kongsgard, K. W., Nordbotten, N. A., Mancini, F., Haakseth, R., & Engelstad, P. E. (2017). Data leakage prevention for secure cross-domain information exchange. IEEE Communications Magazine, 55(10), 37-43. Kongsgard K. W. Nordbotten N. A. Mancini F. Haakseth R. Engelstad P. E. ( 2017 ). Data leakage prevention for secure cross-domain information exchange . IEEE Communications Magazine , 55 ( 10 ), 37 - 43 . Search in Google Scholar

Song, C., & Raghunathan, A. (2020, October). Information leakage in embedding models. In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security (pp. 377-390). Song C. Raghunathan A. ( 2020 , October ). Information leakage in embedding models . In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security (pp. 377 - 390 ). Search in Google Scholar

Li, Q., Ruan, W., Shao, W., & Huang, G. (2017). Information disclosure in an environmental emergency. Disaster Prevention and Management: An International Journal, 26(2), 134-147. Li Q. Ruan W. Shao W. Huang G. ( 2017 ). Information disclosure in an environmental emergency . Disaster Prevention and Management: An International Journal , 26 ( 2 ), 134 - 147 . Search in Google Scholar

Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482-493. Zhang X. Liu S. Chen X. Wang L. Gao B. Zhu Q. ( 2018 ). Health information privacy concerns, antecedents, and information disclosure intention in online health communities . Information & Management , 55 ( 4 ), 482 - 493 . Search in Google Scholar

Rabinovich, Z., Jiang, A. X., Jain, M., & Xu, H. (2015, May). Information disclosure as a means to security. In Proceedings of the 2015 international conference on autonomous agents and multiagent systems (pp. 645-653). Rabinovich Z. Jiang A. X. Jain M. Xu H. ( 2015 , May ). Information disclosure as a means to security . In Proceedings of the 2015 international conference on autonomous agents and multiagent systems (pp. 645 - 653 ). Search in Google Scholar

Joshi, C., & Singh, U. K. (2017). Information security risks management framework–A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128-137. Joshi C. Singh U. K. ( 2017 ). Information security risks management framework–A step towards mitigating security risks in university network . Journal of Information Security and Applications , 35 , 128 - 137 . Search in Google Scholar

Shamala, P., Ahmad, R., Zolait, A., & Sedek, M. (2017). Integrating information quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, 36, 1-10. Shamala P. Ahmad R. Zolait A. Sedek M. ( 2017 ). Integrating information quality dimensions into information security risk management (ISRM) . Journal of Information Security and Applications , 36 , 1 - 10 . Search in Google Scholar

Yanakieva, E., Youssef, M., Rezae, A. H., & Bieniusa, A. (2021). On the Impossibility of Confidentiality, Integrity and Accessibility in Highly-Available File Systems. In Networked Systems: 9th International Conference, NETYS 2021, Virtual Event, May 19–21, 2021, Proceedings (pp. 3-18). Springer International Publishing. Yanakieva E. Youssef M. Rezae A. H. Bieniusa A. ( 2021 ). On the Impossibility of Confidentiality, Integrity and Accessibility in Highly-Available File Systems . In Networked Systems: 9th International Conference, NETYS 2021, Virtual Event, May 19–21, 2021, Proceedings (pp. 3 - 18 ). Springer International Publishing . Search in Google Scholar

Muropa, C. (2023). Personnel Files, Confidentiality and the Right to Privacy. Ecclesiastical Law Journal, 25(3), 314-329. Muropa C. ( 2023 ). Personnel Files, Confidentiality and the Right to Privacy . Ecclesiastical Law Journal , 25 ( 3 ), 314 - 329 . Search in Google Scholar

Xie, J., Xuan, S., You, W., Wu, Z., & Chen, H. (2022). An effective model of confidentiality management of digital archives in a cloud environment. Electronics, 11(18), 2831. Xie J. Xuan S. You W. Wu Z. Chen H. ( 2022 ). An effective model of confidentiality management of digital archives in a cloud environment . Electronics , 11 ( 18 ), 2831 . Search in Google Scholar

Martiri, E., Muca, G., Xhina, E., & Hoxha, K. (2018, November). DMS-XT: A Blockchain-based Document Management System for Secure and Intelligent Archival. In RTA-CSIT (pp. 70-74). Martiri E. Muca G. Xhina E. Hoxha K. ( 2018 , November ). DMS-XT: A Blockchain-based Document Management System for Secure and Intelligent Archival . In RTA-CSIT (pp. 70 - 74 ). Search in Google Scholar

Wan, L. (2021, May). Digital web archive collection framework based on intelligent management information system and optimization. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 1-4). IEEE. Wan L. ( 2021 , May ). Digital web archive collection framework based on intelligent management information system and optimization . In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 1 - 4 ). IEEE . Search in Google Scholar

Lv, Z., & Shi, H. (2020, May). The exploring on university archives management system based on information system. In Journal of Physics: Conference Series (Vol. 1550, No. 3, p. 032017). IOP Publishing. Lv Z. Shi H. ( 2020 , May ). The exploring on university archives management system based on information system . In Journal of Physics: Conference Series (Vol. 1550 , No. 3 , p. 032017 ). IOP Publishing . Search in Google Scholar

Svärd, P. (2019). The impact of new public management through outsourcing on the management of government information: The case of Sweden. Records Management Journal, 29(1/2), 134-151 Svärd P. ( 2019 ). The impact of new public management through outsourcing on the management of government information: The case of Sweden . Records Management Journal , 29 ( 1/2 ), 134 - 151 Search in Google Scholar

Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. Ieee Access, 8, 131723-131740. Yang P. Xiong N. Ren J. ( 2020 ). Data security and privacy protection for cloud storage: A survey . Ieee Access , 8 , 131723 - 131740 . Search in Google Scholar

Li, B. (2017, May). Research on the Security Protection Mechanism of Computer File Management Information System. In 2017 4th International Conference on Education, Management and Computing Technology (ICEMCT 2017) (pp. 1025-1028). Atlantis Press. Li B. ( 2017 , May ). Research on the Security Protection Mechanism of Computer File Management Information System . In 2017 4th International Conference on Education, Management and Computing Technology (ICEMCT 2017) (pp. 1025 - 1028 ). Atlantis Press . Search in Google Scholar

Neelakantan, P., & Malige, G. (2024, August). Advanced Threat Protection for File Storage. In 2024 International Conference on Emerging Techniques in Computational Intelligence (ICETCI) (pp. 244-251). IEEE. Neelakantan P. Malige G. ( 2024 , August ). Advanced Threat Protection for File Storage . In 2024 International Conference on Emerging Techniques in Computational Intelligence (ICETCI) (pp. 244 - 251 ). IEEE . Search in Google Scholar

Feng, M. (2024). Research on Information Data Security of University Archives. Scientific and Social Research, 6(5), 126-131. Feng M. ( 2024 ). Research on Information Data Security of University Archives . Scientific and Social Research , 6 ( 5 ), 126 - 131 . Search in Google Scholar

Hu, Y. (2024). Digital Analysis of Human Resources Archives Based on Network Information Security. Procedia Computer Science, 243, 680-689. Hu Y. ( 2024 ). Digital Analysis of Human Resources Archives Based on Network Information Security . Procedia Computer Science , 243 , 680 - 689 . Search in Google Scholar

Zhou, X. (2020, October). On the Application of Computer Archives Management System and the Path of Security Maintenance. In Journal of Physics: Conference Series (Vol. 1648, No. 3, p. 032094). IOP Publishing. Zhou X. ( 2020 , October ). On the Application of Computer Archives Management System and the Path of Security Maintenance . In Journal of Physics: Conference Series (Vol. 1648 , No. 3 , p. 032094 ). IOP Publishing . Search in Google Scholar

Cao, Q. (2023, November). Research on Information Security Protection Strategy of Digital Archives Based on Blockchain Technology. In Proceedings of the 4th International Conference on Modern Education and Information Management, ICMEIM 2023, September 8–10, 2023, Wuhan, China. Cao Q. ( 2023 , November ). Research on Information Security Protection Strategy of Digital Archives Based on Blockchain Technology . In Proceedings of the 4th International Conference on Modern Education and Information Management, ICMEIM 2023, September 8–10, 2023 , Wuhan, China . Search in Google Scholar

Jing, L. (2023, November). Research on the Optimization Measures of Archives Information Service in Colleges and Universities under the Background of Information Age. In Information and Knowledge Management (Vol. 4, No. 4, pp. 20-26). Clausius Scientific Press. Jing L. ( 2023 , November ). Research on the Optimization Measures of Archives Information Service in Colleges and Universities under the Background of Information Age . In Information and Knowledge Management (Vol. 4 , No. 4 , pp. 20 - 26 ). Clausius Scientific Press . Search in Google Scholar

María Regalado, Nuria Carreras, Christian Mata, Arnau Oliver, Xavier Lladó & Thais Agut. (2024). Automatic Segmentation of Sylvian Fissure in Brain Ultrasound Images of Pre-Term Infants Using Deep Learning Models.. Ultrasound in medicine & biology Regalado María Carreras Nuria Mata Christian Oliver Arnau Lladó Xavier Agut Thais ( 2024 ). Automatic Segmentation of Sylvian Fissure in Brain Ultrasound Images of Pre-Term Infants Using Deep Learning Models .. Ultrasound in medicine & biology Search in Google Scholar

Yunran Zhao & Xuelei Li. (2024). Better approximation of sigmoid function for privacy-preserving neural networks. Journal of Physics: Conference Series(1), 012007-012007. Zhao Yunran Li Xuelei ( 2024 ). Better approximation of sigmoid function for privacy-preserving neural networks . Journal of Physics: Conference Series ( 1 ), 012007 - 012007 . Search in Google Scholar

Sangeetha M. & Nimala K.. (2024). DL-TBAM: Deep Learning Transformer based Architecture Model for Sentiment Analysis on Tamil-English Dataset. Journal of Intelligent & Fuzzy Systems(4), 7479-7493. Sangeetha M. Nimala K. ( 2024 ). DL-TBAM: Deep Learning Transformer based Architecture Model for Sentiment Analysis on Tamil-English Dataset . Journal of Intelligent & Fuzzy Systems ( 4 ), 7479 - 7493 . Search in Google Scholar

Weimin Ge, Jinjun Li, Xiaofeng Wang & Teresa Zielinska. (2024). Robust two-dimensional PCANet with F-norm distance metric. Knowledge-Based Systems111777-. Ge Weimin Li Jinjun Wang Xiaofeng Zielinska Teresa ( 2024 ). Robust two-dimensional PCANet with F-norm distance metric . Knowledge-Based Systems 111777 -. Search in Google Scholar

Debao Wang & Shaopeng Guan. (2025). FedFR-ADP: Adaptive differential privacy with feedback regulation for robust model performance in federated learning. Information Fusion102796-102796. Wang Debao Guan Shaopeng ( 2025 ). FedFR-ADP: Adaptive differential privacy with feedback regulation for robust model performance in federated learning . Information Fusion 102796 - 102796 . Search in Google Scholar

Wu Chun Chung & Chien Hu Peng. (2025). FedCOLA: Federated learning with heterogeneous feature concatenation and local acceleration for non-IID data. Future Generation Computer Systems107674-107674. Chung Wu Chun Peng Chien Hu ( 2025 ). FedCOLA: Federated learning with heterogeneous feature concatenation and local acceleration for non-IID data . Future Generation Computer Systems 107674 - 107674 . Search in Google Scholar

Language:
English