Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Salma Sassi"'
Publikováno v:
Journal of Information and Telecommunication, Vol 5, Iss 1, Pp 16-34 (2021)
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize sto
Externí odkaz:
https://doaj.org/article/3b71f2f631494cc89fcda790e9d7920b
Publikováno v:
Hybrid Intelligent Systems ISBN: 9783031274084
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c99476e5bad825782f30ca34663eaa38
https://doi.org/10.1007/978-3-031-27409-1_25
https://doi.org/10.1007/978-3-031-27409-1_25
Publikováno v:
World Wide Web. 25:2347-2378
Publikováno v:
Journal of Parallel and Distributed Computing. 160:1-15
In light of the emergence of Database-as-a-Service paradigm, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. In such a scenario, access control is considered as a major challenge. In fact, access contro
Publikováno v:
Medical Information Processing and Security: Techniques and applications ISBN: 9781839535253
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a0605fb0cd95c0680007be5d9d183397
https://doi.org/10.1049/pbhe044e_ch5
https://doi.org/10.1049/pbhe044e_ch5
Autor:
Salma Sassi, Richard Chbeir
Publikováno v:
Concurrency and Computation: Practice and Experience. 34
Publikováno v:
Concurrency and Computation: Practice and Experience. 34
Publikováno v:
International journal of data science and analytics. 14(2)
Collective intelligence and Knowledge Exploration (CI and KE) have been adopted to solve many problems. They are particularly used by companies as a support for innovation to efficiently obtain usable results. CI is usually defined as a group ability
Publikováno v:
Concurrency and Computation: Practice and Experience. 34
Publikováno v:
Journal of Information and Telecommunication, Vol 5, Iss 1, Pp 16-34 (2021)
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize sto