Results 51 to 60 of about 4,735 (235)

Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]

open access: yes, 2018
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A   +2 more
core  

Secure Storage with Replication and Transparent Deduplication [PDF]

open access: yesProceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
We seek to answer the following question: To what extent can we deduplicate replicated storage? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers.
Iraklis Leontiadis, Reza Curtmola
openaire   +1 more source

Do drugs approved via expedited approval pathways have therapeutic advantages? A systematic review and meta‐analysis

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Regulators use expedited approval pathways to speed market approval and patient access to promising new drugs. However, there is uncertainty about whether these pathways are successful in approving drugs with significant therapeutic advantages. This systematic review aims to examine the safety, effectiveness and cost‐effectiveness of drugs approved via
Ashleigh Hooimeyer   +4 more
wiley   +1 more source

Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication

open access: yesApplied Sciences
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan   +7 more
doaj   +1 more source

Sigmoid(x): secure distributed network storage [PDF]

open access: yes, 2011
Secure data storage is a serious problem for computer users today, particularly in enterprise environments. As data requirements grow, traditional approaches of secured silos are showing their limitations. They represent a single – or at least, limited –
Goo, Swee Keow   +2 more
core  

Systematic review and scoring‐based selection of pharmacokinetic models for precision dosing of vancomycin in neonates and children

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
This systematic review identified 112 population pharmacokinetic models of vancomycin in neonates and children. To support rational model selection for model‐informed precision, we developed and applied expert‐driven, transparent criteria that integrate both methodological rigour and clinical relevance.
Zoë Vander Elst   +8 more
wiley   +1 more source

A Running Time Improvement for Two Thresholds Two Divisors Algorithm [PDF]

open access: yes, 2009
Chunking algorithms play an important role in data de-duplication systems. The Basic Sliding Window (BSW) algorithm is the first prototype of the content-based chunking algorithm which can handle most types of data. The Two Thresholds Two Divisors (TTTD)
Chang, BingChun
core   +1 more source

Why do people choose to enter and exit the teaching profession? An interdisciplinary quantitative synthesis

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Many nations experience recurring shortages of teachers in particular subjects, prompting concerns that pupils' education is suffering as a result. Researchers have responded by generating a sizable literature on the reasons for which people enter and exit the teaching profession.
Sam Sims   +2 more
wiley   +1 more source

PoSW:novel secure deduplication scheme for collaborative cloud applications

open access: yesTongxin xuebao, 2017
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG   +5 more
doaj   +2 more sources

Secure deduplication storage systems supporting keyword search [PDF]

open access: yesJournal of Computer and System Sciences, 2015
Data deduplication is an attractive technology to reduce storage space for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication,
Li, Jin   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy