Secure outsourcing of sequence comparisons
نویسندگان
چکیده
منابع مشابه
Secure and Efficient Outsourcing of Sequence Comparisons
In this work we treat the problem of secure outsourcing of sequence comparisons by a client to remote servers. The sequence comparison problem, given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, deletions, and substitutions (also called an edit script) that transform λ into μ. In our framework a client owns strings λ and μ and out...
متن کاملTowards Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of c...
متن کاملSecure Data Outsourcing
The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of c...
متن کاملSecure computation outsourcing
Computation outsourcing is used when an entity needs to execute a task but does not have the appropriate computation power to perform it. In this paper, we will survey the approach of delegation: instead of doing the computation locally, the entity outsources it to one or more external helpers which have the appropriate resources. Although this can safely be done for most everyday life tasks, i...
متن کاملSecure Outsourcing of Some Computations
The rapid growth of the Internet facilitates the outsourcing of certain computations, in the following sense: A customer who needs these computations done on some data but lacks the computational resources (or programming expertise) to do so, can use an external agent to perform these computations. This currently arises in many practical situations, including the nancial services and petroleum ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2005
ISSN: 1615-5262,1615-5270
DOI: 10.1007/s10207-005-0070-3