Sciweavers

107 search results - page 12 / 22
» Security in the cloud
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
OOPSLA
2007
Springer
14 years 1 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
CLOUDCOM
2010
Springer
13 years 5 months ago
Attaching Cloud Storage to a Campus Grid Using Parrot, Chirp, and Hadoop
The Hadoop filesystem is a large scale distributed filesystem used to manage and quickly process extremely large data sets. We want to utilize Hadoop to assist with dataintensive ...
Patrick Donnelly, Peter Bui, Douglas Thain
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
SIGCOMM
2010
ACM
13 years 7 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...