Finding Malicious One in Group Data Sharing
نویسندگان
چکیده
منابع مشابه
Data Sharing Enabling Technologies Working Group Results
If empirical software engineering is to prosper as a research domain, the field needs a mechanism for the sharing of data and artifacts developed by one group that may be useful to another group desiring to work in the same area. In the opening session, the workshop discussed a forthcoming position paper entitled “Protocols in the use of Empirical Software Engineering Artifacts” [1]. This paper...
متن کاملMalicious Data Detection in VANET
Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. Poorly designed VANETs that permit serious attacks on the network can jeopardize the goal of increased driving safety. The unwanted...
متن کاملAggregate Key Sharing Mechanism for Sharing Data in Group via Cloud Storage
In cloud storage data sharing is an important utility. Most of the users attracted by cloud storage because of its numerous benefits. The idea of Key Aggregate Searchable Encryption is build through a concrete KASE scheme. In this scheme data owner distribute single trapdoor to the cloud. In this paper , we used multi cloud for storing & accessing the large amount of data because in cloud envir...
متن کاملFinding and Sharing eLearning Objects
For learning communities to effectively share their content with each other, interoperable repository search features and common addressing systems for locating and accessing content objects are necessary. The Academic Advanced Distributed Learning (AADL) Co-Laboratory gathers information about repository systems and provides opportunities for eLearning communities to share ideas and discuss th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2020
ISSN: 0975-8887
DOI: 10.5120/ijca2020920149