Results 61 to 70 of about 28,164 (210)

Inter‐disciplinary perspectives on sustainability in machinery manufacturing

open access: yesInternational Journal of Management Reviews, EarlyView.
Abstract Perspectives on economic, social and environmental sustainability in machinery manufacturing are changing. These are predominantly driven by increased consumer, firm and public knowledge on the importance of sustainability and the role that machinery manufacturers can play to achieve sustainability outcomes.
Oluwaseun E. Olabode   +5 more
wiley   +1 more source

AI-driven anonymization for secure and privacy-preserving business intelligence cloud migration

open access: yesDiscover Computing
Sensitive data protection is a key issue in the context of Business Intelligence (BI), especially considering the increasing emergence of outsourcing computing over cloud.
Najia Khouibiri   +2 more
doaj   +1 more source

Collaborative Outsourced Data Mining for Secure Cloud Computing

open access: yesJournal of Networks, 2014
Data mining is becoming an increasingly important technology for the information society. Due to limited computational resources of data owners and the prevalence of cloud computing, outsourced data mining is becoming more and more attractive. The privacy and security issues are becoming outstanding recently.
Yila Huang, Qiwei Lu, Yan Xiong
openaire   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING [PDF]

open access: yesJournal of Defense Resources Management, 2014
Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in
Amina AIT OUAHMAN
doaj  

CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]

open access: yes, 2015
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy.
Xie, Pengtao, Xing, Eric
core  

Advanced IT Outsourcing By Using Cloud Computing Model

open access: yesINTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2012
In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process outsourcing (BPO) is a more comprehensive definition of the current situation within the outsourcing domain.
Amanbir kaur Chahal, Gurpreet Singh
openaire   +2 more sources

Catch Me If You Can: The Dynamic Nature of Bias in Machine Learning Applications

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Bias in machine learning (ML) applications represents systematic differences between expected and actual values of the predicted outputs, such that certain individuals or groups are systematically and disproportionately (dis)advantaged. This paper investigates the dynamic nature of bias in ML applications.
Monideepa Tarafdar, Irina Rets, Yang Hu
wiley   +1 more source

Security Outsourcing Algorithms by Unimodular Matrix Encryption Method

open access: yesJisuanji kexue yu tansuo, 2020
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj   +1 more source

Secure Outsourcing Algorithm of Polynomials in Cloud Computing

open access: yesInternational Conferences on Software Engineering and Knowledge Engineering, 2016
In the era of information explosion, people have to deal with huge amount of data. It is a great computation burden for the resource- constrained clients. Cloud computing connects large amounts of network resources, and forms a vast pool of resources. It provides much con- venience for people.
Xianlin Zhou   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy