Results 171 to 180 of about 79,561 (230)
Some of the next articles are maybe not open access.
Efficient and Secure Outsourcing of Large-Scale Linear System of Equations
IEEE Transactions on Cloud Computing, 2018Solving the large-scale linear system of equations is one of the most fundamental problems both in theory and practice. However this problem requires too much computational resource for most users to solve it. With the rapid development of cloud services,
Qi Ding +3 more
semanticscholar +1 more source
Security views for outsourced business processes
Proceedings of the 2008 ACM workshop on Secure web services, 2008The workflow of a Virtual Organization is often divided into fragments that are run by different entities having different clearance level or accessibility permissions. Therefore, an important issue is a decomposition of the overall business process into workflow views that can be outsourced to the side of the corresponding contractors.
Massacci, Fabio +2 more
openaire +2 more sources
Secure Outsourcing of Geospatial Vector Data
IEEE International Geoscience and Remote Sensing Symposium, 2019The objective of secure outsourcing is to enforce authorizations specified by the data owner on the outsourced data as service provider cannot be trusted.
Sangita Zope-Chaudhari +2 more
semanticscholar +1 more source
Secure Outsourcing of Matrix Convolutions
2018 IEEE International Conference on Communications (ICC), 2018Due to the rapid growth of various systems and applications like cyber-physical systems, smart cities, and e-commerce systems, we have a massive volume of data collected from these systems and applications. We notice that matrix convolution is one of the most fundamental operations on largescale data, such as using it for image registration and object ...
Kaijin Zhang, Changqing Luo, Pan Li
openaire +1 more source
Non-Interactive and secure outsourcing of PCA-Based face recognition
Computers & security, 2021Yanli Ren +3 more
semanticscholar +1 more source
Lightweight scheme of secure outsourcing SVD of a large matrix on cloud
Journal of Information Security and Applications, 2018For efficiency and economic reasons, a cloud system would be the most attractive choice for high computation tasks. But, computation on cloud is mostly done on clear text. As a result, the risk of data leak would be very high.
Chakan Pramkaew, S. Ngamsuriyaroj
semanticscholar +1 more source
Averting Security Missteps in Outsourcing
IEEE Security and Privacy Magazine, 2005As company-collected data increases in value, it attracts interest from unauthorized persons to access, misappropriate, and misuse it. Despite such risks, companies and financial institutions increasingly contract business processing of data (and other activities normally handled inhouse) to third parties - affiliates or independent service providers ...
E.M. Power, R.L. Trope
openaire +1 more source
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
IEEE Transactions on Cloud Computing, 2018Outsourcing computation allows an outsourcer with limited resource to delegate the computation load to a powerful server without the exposure of true inputs and outputs. It is well known that modular exponentiation is one of the most expensive operations
Yanli Ren +4 more
semanticscholar +1 more source
Secure Outsourcing of Virtual Appliance
IEEE Transactions on Cloud Computing, 2017Computation outsourcing using virtual appliance is getting prevalent in cloud computing. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see frequent reports of security accidents, like data leakages or abuses.
Yubin Xia +6 more
openaire +1 more source
Towards Secure Data Outsourcing
2007The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control
openaire +1 more source

