Results 21 to 30 of about 79,561 (230)

A secure data outsourcing scheme based on Asmuth – Bloom secret sharing [PDF]

open access: yes, 2015
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service ...
Habbal, Adib   +4 more
core   +1 more source

Secure outsourcing of sequence comparisons [PDF]

open access: yesInternational Journal of Information Security, 2005
Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small ...
Mikhail J. Atallah, Jiangtao Li
openaire   +1 more source

Outsourcing Managed Security Services [PDF]

open access: yes, 2003
As computer attack patterns shift and threats to networks change and grow almost daily, it is critical that organizations achieve reliable information security. Investment decisions about information security are best considered in the context of managing business risk. Risks can be accepted, mitigated, avoided, or transferred.
Carol Sledge   +4 more
openaire   +2 more sources

Toward Efficient Encrypted Image Retrieval in Cloud Environment

open access: yesIEEE Access, 2019
Outsourcing image search services to public clouds is an ever-increasing trend. However, directly outsourcing image datasets to untrusted clouds introduces privacy concerns. Several secure image retrieval schemes have been proposed recently.
Zhengbai Huang, Meng Zhang, Yi Zhang
doaj   +1 more source

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

open access: yesBMC Medical Genomics, 2017
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen   +9 more
doaj   +1 more source

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Lattice-Based Cryptanalysis on Outsourcing Scheme of Modular Exponentiations ExpSOS [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
With the popularity of cloud computing, outsourcing computing, as an important form of cloud service, has attracted more and more attention from academia and industry.
ZHENG Yunhai, TIAN Chengliang
doaj   +1 more source

Secure efficient and verifiable large linear equations solve outsourcing computing scheme

open access: yes网络与信息安全学报, 2017
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj   +3 more sources

Practical Secure Computation Outsourcing [PDF]

open access: yesACM Computing Surveys, 2018
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes
Zihao Shan   +3 more
openaire   +1 more source

Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud

open access: yesIEEE Access, 2016
Cloud computing enables customers with limited computational resources to outsource their huge computation workloads to the cloud with massive computational power.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

Home - About - Disclaimer - Privacy