نتایج جستجو برای: outsourced data

تعداد نتایج: 2411127  

2009

Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of datamining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the outsourced database are considered private property of the ...

2013
Anis Bkakria Frédéric Cuppens Nora Cuppens-Boulahia José M. Fernandez

Ensuring confidentiality of outsourced data continues to be an area of active research in the field of privacy protection. Almost all existing privacy-preserving approaches to address this problem rely on heavyweight cryptographic techniques with a large computational overhead that makes inefficient on large databases. In this paper, we address this problem by improving on an existing approach ...

2007
Sabrina De Capitani di Vimercati Sara Foresti Sushil Jajodia Stefano Paraboschi Pierangela Samarati

Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to be addressed in this context concerns the enforcement of selective authorization policies and the support of policy updates in dynamic scenarios. In this paper, we present a novel solution to the enforcement of access c...

2012
Mariana Raykova Hang Zhao Steven M. Bellovin

Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. Howeve...

Journal: :Health care management review 2016
Naresh Khatri Vishal Gupta

OBJECTIVES Two issues pertaining to the effective implementation of health information technologies (HITs) in U.S. hospitals are examined. First, which information technology (IT) system is better--a homegrown or an outsourced one? In the second issue, the critical role of in-house IT expertise/capabilities in the effective implementation of HITs is investigated. STUDY DESIGN/DATA COLLECTION ...

2014
M. Shobana

Attribute-based encryption allow user to encrypt data using public-key then it decrypt data using private-key in the cloud. ABE provide the public-key one-to-many encryption. Access polices and user attributes are associated with private keys and ciphertexts. The drawbacks of the existing ABE schemes are that decryption involves expensive pairing operations, the number of such operations grows ...

Journal: :Australian Journal of Public Administration 2006

Journal: :IEEE Transactions on Knowledge and Data Engineering 2016

2012
Wensheng Zhang Chuang Wang

This paper presents a group signature scheme called AdHocSign for dynamically formed groups, to support accountable and anonymous access to outsourced data. Each user is assigned a certain set of attributes and the secrets associated with these attributes when joining the system; the access to outsourced data is regulated by a logical expression of attribute which defines an ad hoc group of aut...

Journal: :Int. Journal of Network Management 2012
Emmanuele Zambon Sandro Etalle Roel Wieringa

IT service availability is at the core of customer satisfaction and business success for today’s organisations. Many medium-large size organisations outsource part of their IT services to external providers, with Service Level Agreements describing the agreed availability of outsourced service components. Availability management of partially outsourced IT services is a non trivial task since cl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید