Sciweavers

162 search results - page 12 / 33
» Outsourcing Multi-Party Computation
Sort
View
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 11 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
AMW
2011
13 years 1 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
VLDB
2007
ACM
119views Database» more  VLDB 2007»
14 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
SEAFOOD
2007
Springer
14 years 3 months ago
The Value of Outsourced Software
Outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property, as software, is transferred a...
Gio Wiederhold, Amar Gupta, Rajat Mittal, Erich J....
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
14 years 11 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...