Sciweavers

39 search results - page 4 / 8
» Authorized Private Keyword Search over Encrypted Data in Clo...
Sort
View
CIKM
2009
Springer
13 years 11 months ago
Personalization as a service: the architecture and a case study
Cloud computing has become a hot topic in the IT industry. Great efforts have been made to establish cloud computing platforms for enterprise users, mostly small businesses. Howe...
Hang Guo, Jidong Chen, Wentao Wu, Wei Wang 0009
INFOCOM
2010
IEEE
13 years 5 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
DBSEC
2008
196views Database» more  DBSEC 2008»
13 years 8 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
SRDS
2010
IEEE
13 years 4 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
CLOUDCOM
2010
Springer
13 years 4 months ago
Efficient Metadata Generation to Enable Interactive Data Discovery over Large-Scale Scientific Data Collections
Discovering the correct dataset efficiently is critical for computations and effective simulations in scientific experiments. In contrast to searching web documents over the Intern...
Sangmi Lee Pallickara, Shrideep Pallickara, Milija...