Zobrazeno 1 - 10
of 2 051
pro vyhledávání: '"Client-side encryption"'
Autor:
Helevä, Salle
M-Files is a document management platform used by enterprise customers. Customers may wish to use M-Files for sensitive documents, the confidentiality of which cannot be trusted with third parties. To this end, a system should be implemented that ena
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4853::b9b20e46472476c6c3451d0c70d116ca
https://trepo.tuni.fi/handle/10024/146301
https://trepo.tuni.fi/handle/10024/146301
Publikováno v:
IEEE Transactions on Services Computing. 13:572-583
Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner's access policy, it has the right to access the data owner's remot
Publikováno v:
IEEE Transactions on Services Computing. 13:464-477
Searchable encryption is an important technique for public cloud storage service to provide user data confidentiality protection and at the same time allow users performing keyword search over their encrypted data. Previous schemes only deal with exa
Publikováno v:
IEEE Transactions on Services Computing. 13:478-487
Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data. However, the decryption cost and ciphertext size restrict the application of ABE in practice. For most existing ABE schemes, the decrypti
Publikováno v:
IEEE Transactions on Cloud Computing. 8:484-494
© 2013 IEEE. In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. In this case, only authorized doctors are allowed to access the data since the medical data is highly sensitive. Before outsourcing, the
Autor:
Peilin Hong, Nenghai Yu, David S. L. Wei, Jianan Hong, Yingjie Xue, Kaiping Xue, Weikeng Chen
Publikováno v:
IEEE Transactions on Services Computing. 13:158-171
The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one hand, it frees data owners from the technical management, and is easier for data owners to share their data with intended users. On the other hand, it poses new cha
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Cloud Computing. 7:988-1001
Database outsourcing is a common cloud computing paradigm that allows data owners to take advantage of its on-demand storage and computational resources. The main challenge is maintaining data confidentiality with respect to untrusted parties i.e., c
Autor:
Martin Johns, Alexandra Dirksen
Publikováno v:
CCSW@CCS
The recent years have brought an influx of privacy conscious applications, that enable strong security guarantees for end-users via end-to-end or client-side encryption. Unfortunately, this application paradigm is not easily transferable to web-based
Autor:
J. David Livingston, E. Kirubakaran
Publikováno v:
Intelligence in Big Data Technologies—Beyond the Hype ISBN: 9789811552847
Cloud computing is a kind of distributed computing that provides its customers on-demand, utility-based computing devices. It gives the ability to its customers to store and access their data on the cloud instead of keeping them on the local computer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::68f5d4c6b40ee170e2ba068ae5d2d7d8
https://doi.org/10.1007/978-981-15-5285-4_48
https://doi.org/10.1007/978-981-15-5285-4_48