Sciweavers

3452 search results - page 15 / 691
» Secure Data Outsourcing
Sort
View
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 2 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
14 years 10 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
TODS
2010
61views more  TODS 2010»
13 years 7 months ago
Encryption policies for regulating access to outsourced data
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
VLDB
2010
ACM
192views Database» more  VLDB 2010»
13 years 7 months ago
Enabling search services on outsourced private spatial data
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 3 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...