Sciweavers

3452 search results - page 26 / 691
» Secure Data Outsourcing
Sort
View
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 8 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
ICDCS
2011
IEEE
12 years 8 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
14 years 2 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
CCS
2006
ACM
14 years 10 days ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
AIM
2006
13 years 10 months ago
Developing a framework for analyzing IS/IT backsourcing
: Companies implementing an IS/IT backsourcing strategy (i.e. bringing IT functions back in-house after they have been outsourced) aiming at increasing operational effectiveness ma...
Jacky Akoka, Isabelle Comyn-Wattiau