Sciweavers

3452 search results - page 10 / 691
» Secure Data Outsourcing
Sort
View
PROFES
2007
Springer
14 years 1 months ago
An Industrial Survey of Software Outsourcing in China
Most studies of software outsourcing focus on how to manage the outsourcing from the perspective of the outsourcer, i.e., a company issuing a subcontract. There are few studies of ...
Jianqiang Ma, Jingyue Li, Weibing Chen, Reidar Con...
ISJ
2002
84views more  ISJ 2002»
13 years 7 months ago
Transaction attributes and software outsourcing success: an empirical investigation of transaction cost theory
In recent years, an increasing amount of attention has been paid to information systems (IS) outsourcing by practitioners as well as academics. However, our understanding of the fa...
Eric T. G. Wang
ICDCS
2010
IEEE
13 years 4 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CAISE
2007
Springer
14 years 1 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
ICDE
2006
IEEE
115views Database» more  ICDE 2006»
14 years 8 months ago
Provable Security for Outsourcing Database Operations
Sergei Evdokimov, Matthias Fischmann, Oliver G&uum...