Results 71 to 80 of about 130,811 (179)

Automated legal sensemaking: the centrality of relevance and intentionality [PDF]

open access: yes, 2008
Introduction: In a perfect world, discovery would ideally be conducted by the senior litigator who is responsible for developing and fully understanding all nuances of their client’s legal strategy.
Bruce Hedin   +4 more
core  

Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general, can be obtained by encrypting the data before it is outsourced.
Bibin Baby, Sharmila Banu
openaire   +1 more source

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

open access: yesIEEE Access, 2019
Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the consideration of privacy ...
Cheng Guo   +3 more
doaj   +1 more source

Study of Various Multi Keyword Search in Cloud Computing

open access: yesInternational Journal of Advanced Research in Computer Science and Software Engineering, 2017
With the approach of cloud computing, information proprietors are persuaded to outsource their unpredictable data management frameworks from nearby places to the business open cloud for efficient adaptability. Accordingly, empowering a scrambled cloud information look administration is of vital significance.
Hitesh Pardesi, Naveen Kumari
openaire   +1 more source

Dynamic Management of Equi-Join Results for Multi-Keyword Searches [PDF]

open access: yesThe KIPS Transactions:PartA, 2010
ABSTRACT With an increasing number of documents in the Internet or enterprises, it becomes crucial to efficiently support users’ queries on those documents. In that situation, the full-text search technique is accepted in general, because it can answer uncontrolled ad-hoc queries by automatically indexing all the keywords found in the documents.
openaire   +1 more source

Searchable encryption with randomized ciphertext and randomized keyword search

open access: yesJournal of Mathematical Cryptology
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized ...
Calderini Marco   +3 more
doaj   +1 more source

Evaluating Collaborative Information Seeking Interfaces with a Search-Oriented Inspection Method and Re-framed Information Seeking Theory

open access: yes, 2009
Despite the many implicit references to the social contexts of search within Information Seeking and Retrieval research, there has been relatively little work that has specifically investigated the additional requirements for collaborative information ...
schraefel, m.c., Wilson, Max L.
core  

Health Infomatics Using Multy-Keyword Rank Search Over Cloud

open access: yesInternational Journal on Recent and Innovation Trends in Computing and Communication, 2015
This projects targets on the productivity of the cloud computing technology in health care industry. Health care sector is one of the largest sectors in the world. Health care industry depends mainly on Information Technology to provide best service and accuracy of information to their patients.
openaire   +1 more source

Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

open access: yesAdvances in Electrical and Computer Engineering, 2016
As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied.
LEE, Y., KIM, P., PARK, Y.
doaj   +1 more source

Multi-server conjunctive keyword searchable encryption scheme based on BDH problem

open access: yesDianxin kexue, 2020
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj   +2 more sources

Home - About - Disclaimer - Privacy