Results 71 to 80 of about 79,561 (230)

Protecting genomic data analytics in the cloud: state of the art and opportunities

open access: yesBMC Medical Genomics, 2016
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously ...
Haixu Tang   +10 more
doaj   +1 more source

Privacy-preserving and efficient outsourcing computation scheme for principal component analysis

open access: yesCybersecurity
Currently, the rapid development of Internet of Things (IoT) technology and the deepening digital transformation of traditional industries have driven substantial growth in the Machine Learning as a Service (MLaaS) market to meet massive data processing ...
Yan Ding, Ye Du
doaj   +1 more source

Secure Outsourced Calculations with Homomorphic Encryption

open access: yesAdvanced Computing: An International Journal, 2018
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these
Wang, Qi, Zhou, Dehua, Li, Yanling
openaire   +2 more sources

Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Secure report is the problem of a client that retrieves all records matching specified attributes from a database table at the server (e.g. cloud), as in SQL SELECT queries, but where the query and the database are encrypted.
Adi Akavia, Dan Feldman, Hayim Shaul
doaj   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture

open access: yesTongxin xuebao, 2023
To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was ...
Xuejiao LIU, Tiancong CAO, Yingjie XIA
doaj   +2 more sources

The Accounting Industry in the Age of Globalization and Offshore Outsourcing [PDF]

open access: yes, 2008
The phenomenon of outsourcing has engulfed the accounting industry and offers a wide range of services from bookkeeping, accounts payable, debt collection, invoicing, to tax return preparation.
Daley, Ryan
core   +1 more source

Preserving Both Privacy and Utility in Network Trace Anonymization

open access: yes, 2018
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam   +22 more
core   +1 more source

Supply Chains and Porous Boundaries: The Disaggregation of Legal Services [PDF]

open access: yes, 2010
The economic downturn has had significant effects on law firms, and is causing many of them to rethink some basic assumptions about how they operate. In important respects, however, the downturn has simply intensified the effects of some deeper trends ...
Heenan, Palmer T., Regan, Milton C.
core   +2 more sources

Parallel Secure Outsourcing of Large-Scale Nonlinearly Constrained Nonlinear Programming Problems

open access: yesIEEE Transactions on Big Data, 2022
Changqing Luo   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy