Sciweavers

3452 search results - page 9 / 691
» Secure Data Outsourcing
Sort
View
SDMW
2004
Springer
14 years 24 days ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 7 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
CCS
2004
ACM
14 years 25 days ago
New client puzzle outsourcing techniques for DoS resistance
Brent Waters, Ari Juels, J. Alex Halderman, Edward...
INFOCOM
2010
IEEE
13 years 5 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 2 months ago
Are There Contagion Effects in the Diffusion of IT Outsourcing?
Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...