Sciweavers

3452 search results - page 19 / 691
» Secure Data Outsourcing
Sort
View
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
13 years 9 days ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
ICIS
2003
13 years 10 months ago
Knowledge Partitioning in Outsourced Software Development: A Field Study
The outsourced software development process has traditionally relied on a requirements-driven black-box approach for transferring knowledge of customer needs to vendors. When this...
Amrit Tiwana
TRUST
2010
Springer
14 years 1 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
TKDE
2008
154views more  TKDE 2008»
13 years 8 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 2 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...