نتایج جستجو برای: outsourced data
تعداد نتایج: 2411127 فیلتر نتایج به سال:
Offshore and outsourced development are the latest facts of life of professional software building. The easily identifiable advantages of these trends – such as cost benefits, continuous delivery and support – have already been explored to considerable extent. But how does offshore and outsourced development affect the delegation of responsibilities to components of a software system? In this p...
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. Since a service provider is almost never fully trusted, security and privacy of outsourced data are important concerns. This paper focuses on integrity and authenticity issues in outsourced databases. Whenever someone queries a hosted database, th...
Existing approaches for protecting sensitive information stored (outsourced) at external “honest-but-curious” servers are typically based on an overlying layer of encryption that is applied on the whole information, or use a combination of fragmentation and encryption. The computational load imposed by encryption makes such approaches not suitable for scenarios with lightweight clients. In this...
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequent conjunctive keyword searches for matching documents. The protocols provide full computational privacy, query correctness assurances and no leaks: the server either correctly executes client queries or (if it behaves ...
Despite the fact that using the services of outsourced data stream servers has been welcomed extremely, still the problem of obtaining assurance about the received results from these untrusted servers in unsecure environment is one of the basic challenges. In this paper, we present a probabilistic model for auditing received results from an outsourced data stream server through unsecure communi...
Digital Covid certificates are the first widely deployed end-user cryptographic certificates. For service providers, such as airlines or event ticket vendors, that needed to check their (global) customers satisfy certain health policies, verification of was challenging though - not because cryptography involved, but due multitude issuers, different certificate types and evolving nature country-...
Outsourcing is in this study defined as the transfer of responsibility and activities, including relevant assets and resources, from a user to a legally separate party, that becomes a vendor to the user. An outsourcer transfers activities to an outsourced unit. The situation of the outsourced unit becomes problematic in its provision of goods or services to both the outsourcer and other buyers....
This policy-related study examines primary care delivery methods in reducing population health disparities. We use postneonatal mortality as an indicator of population health within counties to study the effects of using contracted service providers compared to direct provision of primary care by county health departments in improving health equity. We analyzed postneonatal mortality data colle...
Currently, the amount of sensitive data produced by many organizations is outpacing their storage ability. The management of such huge amount of data is quite expensive due to the requirements of high storage capacity and qualified personnel. Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their data to be stored o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید