Zobrazeno 1 - 10
of 299
pro vyhledávání: '"Integrity checking"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 5, Pp 593-599 (2021)
Cloud Data storage services allows users to easily store and access their data with any type of connected devices. However, since the data is outsourced, the user needs an auditing mechanism that enables him to check the integrity of his data without
Externí odkaz:
https://doaj.org/article/f0818d859fc04f49be23dafd49375c39
Autor:
Hao Yan, Wenming Gui
Publikováno v:
IEEE Access, Vol 9, Pp 45822-45831 (2021)
Provable Data Possession (PDP) model provides an efficient means for people to audit the integrity of data stored in cloud storage. When sensitive data is shared among multiple users based on cloud storage, it is critical to preserve the anonymity of
Externí odkaz:
https://doaj.org/article/f797f6a40b88433a836f33eb42b7344c
Publikováno v:
IEEE Access, Vol 8, Pp 31471-31480 (2020)
Cyber-Physical-Social System (CPSS) provides users secure and high-quality mobile service applications to share and exchange data in the cyberspace and physical world. With the explosive growth of data, it is necessary to introduce cloud storage serv
Externí odkaz:
https://doaj.org/article/9920af403f834e6783190defbe2f8511
Autor:
Zaid Alaa Hussien, Husam A. Abdulmalik, Mohammed Abdulridha Hussain, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 691 (2023)
The information obtained from external sources within the cloud and the resulting computations are not always reliable. This is attributed to the absence of tangible regulations and information management on the part of the information owners. Althou
Externí odkaz:
https://doaj.org/article/2c74a4f6eb3d41b58a2e285b4f80cf64
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Tongxin xuebao, Vol 40, Pp 128-139 (2019)
With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An iden
Externí odkaz:
https://doaj.org/article/350e12a0a16b4981bb912ff02f7d2412
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-15 (2019)
Abstract Recently released Intel processors have been equipped with hardware instruction tracing facilities to securely and efficiently record the program execution path. In this paper, we study a case for data integrity checking based on Intel Proce
Externí odkaz:
https://doaj.org/article/486789920dee4749b68623b80206d980
Publikováno v:
Buildings, Vol 12, Iss 7, p 934 (2022)
Due to the growing complexity of mechanical, electrical, and plumbing (MEP) designs and the rules that govern them, performing rule checks manually has become expensive. However, MEP-based rule checking has not received adequate attention compared to
Externí odkaz:
https://doaj.org/article/3d127517d97a43b39dd8e87c55dff68f