Results 71 to 80 of about 130,811 (179)
Automated legal sensemaking: the centrality of relevance and intentionality [PDF]
Introduction: In a perfect world, discovery would ideally be conducted by the senior litigator who is responsible for developing and fully understanding all nuances of their client’s legal strategy.
Bruce Hedin +4 more
core
Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search
Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general, can be obtained by encrypting the data before it is outsourced.
Bibin Baby, Sharmila Banu
openaire +1 more source
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the consideration of privacy ...
Cheng Guo +3 more
doaj +1 more source
Study of Various Multi Keyword Search in Cloud Computing
With the approach of cloud computing, information proprietors are persuaded to outsource their unpredictable data management frameworks from nearby places to the business open cloud for efficient adaptability. Accordingly, empowering a scrambled cloud information look administration is of vital significance.
Hitesh Pardesi, Naveen Kumari
openaire +1 more source
Dynamic Management of Equi-Join Results for Multi-Keyword Searches [PDF]
ABSTRACT With an increasing number of documents in the Internet or enterprises, it becomes crucial to efficiently support users’ queries on those documents. In that situation, the full-text search technique is accepted in general, because it can answer uncontrolled ad-hoc queries by automatically indexing all the keywords found in the documents.
openaire +1 more source
Searchable encryption with randomized ciphertext and randomized keyword search
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized ...
Calderini Marco +3 more
doaj +1 more source
Despite the many implicit references to the social contexts of search within Information Seeking and Retrieval research, there has been relatively little work that has specifically investigated the additional requirements for collaborative information ...
schraefel, m.c., Wilson, Max L.
core
Health Infomatics Using Multy-Keyword Rank Search Over Cloud
This projects targets on the productivity of the cloud computing technology in health care industry. Health care sector is one of the largest sectors in the world. Health care industry depends mainly on Information Technology to provide best service and accuracy of information to their patients.
openaire +1 more source
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud
As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied.
LEE, Y., KIM, P., PARK, Y.
doaj +1 more source
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj +2 more sources

