Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Bijit Hore"'
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::95ed5fa6acfee863fb66bfe83b9d35c5
https://doi.org/10.1007/978-3-642-27739-9_914-2
https://doi.org/10.1007/978-3-642-27739-9_914-2
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2b89dd082ac608fe8fc9900d60e0faa1
https://doi.org/10.1007/978-3-642-27739-9_761-2
https://doi.org/10.1007/978-3-642-27739-9_761-2
Publikováno v:
IEEE Transactions on Computers. 62:1432-1446
In this paper, we explore a new form of dissemination that arises in distributed, mission-critical applications called Flash Dissemination. This involves the rapid dissemination of rich information to a large number of recipients in a very short peri
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 23:844-852
In this paper, we propose a content-based publish/subscribe (pub/sub) framework that delivers matching content to subscribers in their desired format. Such a framework enables the pub/sub system to accommodate richer content formats including multime
Publikováno v:
The VLDB Journal. 21:333-358
In this paper, we study the problem of supporting multidimensional range queries on encrypted data. The problem is motivated by secure data outsourcing applications where a client may store his/her data on a remote server in encrypted form and want t
Publikováno v:
Proceedings of the VLDB Endowment. 3:13-24
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data leakage from compromised/stolen storage devices. However, recent studies
Autor:
Kerim Yasin Oktay, Bijit Hore, Bhavani Thuraisingham, Murat Kantarcioglu, Sharad Mehrotra, Vaibhav Khadilkar
Publikováno v:
IEEE CLOUD
This paper explores an efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting. We propose a principled framework for distributing data and processing in a hybrid cloud that meets the conf
Publikováno v:
IEEE CLOUD
This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in gene
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642328725
Secure Data Management
Secure Data Management
We propose a scheme to index encrypted documents on an untrusted server and evaluate keyword search queries against them. The proposed scheme provides better security than deterministic encryption schemes and is far more efficient than existing searc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef9df6096b0eef79ea5dae6f0fd2d079
https://doi.org/10.1007/978-3-642-32873-2_7
https://doi.org/10.1007/978-3-642-32873-2_7