Sciweavers

49 search results - page 7 / 10
» Shared and Searchable Encrypted Data for Untrusted Servers
Sort
View
ICDCS
2008
IEEE
14 years 1 months ago
MR-PDP: Multiple-Replica Provable Data Possession
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evide...
Reza Curtmola, Osama Khan, Randal C. Burns, Giusep...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 4 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 10 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
ACSAC
2009
IEEE
14 years 2 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
13 years 7 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny