Results 171 to 180 of about 79,561 (230)
Some of the next articles are maybe not open access.

Efficient and Secure Outsourcing of Large-Scale Linear System of Equations

IEEE Transactions on Cloud Computing, 2018
Solving the large-scale linear system of equations is one of the most fundamental problems both in theory and practice. However this problem requires too much computational resource for most users to solve it. With the rapid development of cloud services,
Qi Ding   +3 more
semanticscholar   +1 more source

Security views for outsourced business processes

Proceedings of the 2008 ACM workshop on Secure web services, 2008
The workflow of a Virtual Organization is often divided into fragments that are run by different entities having different clearance level or accessibility permissions. Therefore, an important issue is a decomposition of the overall business process into workflow views that can be outsourced to the side of the corresponding contractors.
Massacci, Fabio   +2 more
openaire   +2 more sources

Secure Outsourcing of Geospatial Vector Data

IEEE International Geoscience and Remote Sensing Symposium, 2019
The objective of secure outsourcing is to enforce authorizations specified by the data owner on the outsourced data as service provider cannot be trusted.
Sangita Zope-Chaudhari   +2 more
semanticscholar   +1 more source

Secure Outsourcing of Matrix Convolutions

2018 IEEE International Conference on Communications (ICC), 2018
Due to the rapid growth of various systems and applications like cyber-physical systems, smart cities, and e-commerce systems, we have a massive volume of data collected from these systems and applications. We notice that matrix convolution is one of the most fundamental operations on largescale data, such as using it for image registration and object ...
Kaijin Zhang, Changqing Luo, Pan Li
openaire   +1 more source

Non-Interactive and secure outsourcing of PCA-Based face recognition

Computers & security, 2021
Yanli Ren   +3 more
semanticscholar   +1 more source

Lightweight scheme of secure outsourcing SVD of a large matrix on cloud

Journal of Information Security and Applications, 2018
For efficiency and economic reasons, a cloud system would be the most attractive choice for high computation tasks. But, computation on cloud is mostly done on clear text. As a result, the risk of data leak would be very high.
Chakan Pramkaew, S. Ngamsuriyaroj
semanticscholar   +1 more source

Averting Security Missteps in Outsourcing

IEEE Security and Privacy Magazine, 2005
As company-collected data increases in value, it attracts interest from unauthorized persons to access, misappropriate, and misuse it. Despite such risks, companies and financial institutions increasingly contract business processing of data (and other activities normally handled inhouse) to third parties - affiliates or independent service providers ...
E.M. Power, R.L. Trope
openaire   +1 more source

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server

IEEE Transactions on Cloud Computing, 2018
Outsourcing computation allows an outsourcer with limited resource to delegate the computation load to a powerful server without the exposure of true inputs and outputs. It is well known that modular exponentiation is one of the most expensive operations
Yanli Ren   +4 more
semanticscholar   +1 more source

Secure Outsourcing of Virtual Appliance

IEEE Transactions on Cloud Computing, 2017
Computation outsourcing using virtual appliance is getting prevalent in cloud computing. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see frequent reports of security accidents, like data leakages or abuses.
Yubin Xia   +6 more
openaire   +1 more source

Towards Secure Data Outsourcing

2007
The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control
openaire   +1 more source

Home - About - Disclaimer - Privacy