Results 61 to 70 of about 28,164 (210)
Inter‐disciplinary perspectives on sustainability in machinery manufacturing
Abstract Perspectives on economic, social and environmental sustainability in machinery manufacturing are changing. These are predominantly driven by increased consumer, firm and public knowledge on the importance of sustainability and the role that machinery manufacturers can play to achieve sustainability outcomes.
Oluwaseun E. Olabode +5 more
wiley +1 more source
AI-driven anonymization for secure and privacy-preserving business intelligence cloud migration
Sensitive data protection is a key issue in the context of Business Intelligence (BI), especially considering the increasing emergence of outsourcing computing over cloud.
Najia Khouibiri +2 more
doaj +1 more source
Collaborative Outsourced Data Mining for Secure Cloud Computing
Data mining is becoming an increasingly important technology for the information society. Due to limited computational resources of data owners and the prevalence of cloud computing, outsourced data mining is becoming more and more attractive. The privacy and security issues are becoming outstanding recently.
Yila Huang, Qiwei Lu, Yan Xiong
openaire +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING [PDF]
Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in
Amina AIT OUAHMAN
doaj
CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy.
Xie, Pengtao, Xing, Eric
core
Advanced IT Outsourcing By Using Cloud Computing Model
In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process outsourcing (BPO) is a more comprehensive definition of the current situation within the outsourcing domain.
Amanbir kaur Chahal, Gurpreet Singh
openaire +2 more sources
Catch Me If You Can: The Dynamic Nature of Bias in Machine Learning Applications
ABSTRACT Bias in machine learning (ML) applications represents systematic differences between expected and actual values of the predicted outputs, such that certain individuals or groups are systematically and disproportionately (dis)advantaged. This paper investigates the dynamic nature of bias in ML applications.
Monideepa Tarafdar, Irina Rets, Yang Hu
wiley +1 more source
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj +1 more source
Secure Outsourcing Algorithm of Polynomials in Cloud Computing
In the era of information explosion, people have to deal with huge amount of data. It is a great computation burden for the resource- constrained clients. Cloud computing connects large amounts of network resources, and forms a vast pool of resources. It provides much con- venience for people.
Xianlin Zhou +5 more
openaire +1 more source

