Results 21 to 30 of about 79,561 (230)
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib +4 more
core +1 more source
Secure outsourcing of sequence comparisons [PDF]
Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small ...
Mikhail J. Atallah, Jiangtao Li
openaire +1 more source
Outsourcing Managed Security Services [PDF]
As computer attack patterns shift and threats to networks change and grow almost daily, it is critical that organizations achieve reliable information security. Investment decisions about information security are best considered in the context of managing business risk. Risks can be accepted, mitigated, avoided, or transferred.
Carol Sledge +4 more
openaire +2 more sources
Toward Efficient Encrypted Image Retrieval in Cloud Environment
Outsourcing image search services to public clouds is an ever-increasing trend. However, directly outsourcing image datasets to untrusted clouds introduces privacy concerns. Several secure image retrieval schemes have been proposed recently.
Zhengbai Huang, Meng Zhang, Yi Zhang
doaj +1 more source
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen +9 more
doaj +1 more source
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Lattice-Based Cryptanalysis on Outsourcing Scheme of Modular Exponentiations ExpSOS [PDF]
With the popularity of cloud computing, outsourcing computing, as an important form of cloud service, has attracted more and more attention from academia and industry.
ZHENG Yunhai, TIAN Chengliang
doaj +1 more source
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj +3 more sources
Practical Secure Computation Outsourcing [PDF]
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan +3 more
openaire +1 more source
Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud
Cloud computing enables customers with limited computational resources to outsource their huge computation workloads to the cloud with massive computational power.
Lifeng Zhou, Chunguang Li
doaj +1 more source

