منابع مشابه
Survey on Password Quality and Confidentiality
In this paper are presented results of empirical survey on password quality self-assessment and several privacy issues regarding password manipulation among information systems’ users. Data was collected by questioning 627 e-mail users that were adults, Croatian national and were using e-mail system on regular basis. Comparisons among different kind of users were done regarding age, gender, tec...
متن کاملCloud Data Patterns for Confidentiality
Cloud computing enables cost-effective, self-service, and elastic hosting of applications in the Cloud. Applications may be partially or completely moved to the Cloud. When hosting or moving the database layer to the Cloud, challenges such as avoidance of disclosure of critical data have to be faced. The main challenges are handling different levels of confidentiality and satisfying security an...
متن کاملData confidentiality in cloud-based pervasive system
Data condentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing capabilities, smart devices need to rely on cloud servers for heavy-duty computations such as matrix multiplication. Conventional security mechanisms such as public key encryption is...
متن کاملData Confidentiality using Fragmentation in Cloud Computing
Data confidentiality is one of the pressing challenges in the ongoing research in Cloud computing. Hosting confidential business data at a Cloud Service Provider (CSP) requires the transfer of control over the data to a semi-trusted external service provider. Existing solutions to protect the data mainly rely on cryptographic techniques. However, these cryptographic techniques add computational...
متن کاملLong term confidentiality: a survey
Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a computationally secure cryptosystem cannot provide a guarantee of long term confidentiality, due to potential advances in computing power or cryptanalysis. Long term confidentiality is ensured by information theoretically secure ciphers, but at the expense of impractical key agreeme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2015
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2015.0418008