Sciweavers

624 search results - page 5 / 125
» Expanding IS Outsourcing Services Through Application Servic...
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
HICSS
2003
IEEE
122views Biometrics» more  HICSS 2003»
14 years 27 days ago
Managing Quality Uncertainty Through Contingency Pricing
We analyze quality-contingent prices as a mechanism for mitigating the effects of quality uncertainty in e-commerce and IT goods services. A contingency pricing contract specifie...
Hemant K. Bhargava, Shankar Sundaresan
SDMW
2004
Springer
14 years 29 days ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 7 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia