• Aucun résultat trouvé

[PDF] Top 20 Distributed Secure Search in the Personal Cloud

Has 10000 "Distributed Secure Search in the Personal Cloud" found on our website. Below are the top 20 most common "Distributed Secure Search in the Personal Cloud".

Distributed Secure Search in the Personal Cloud

Distributed Secure Search in the Personal Cloud

... consider the Secure Personal Cloud Platform of Alice as pictured in Figure ...1. The main component is a home cloud data system gathering personal data from ... Voir le document complet

5

Supporting secure keyword search in the personal cloud

Supporting secure keyword search in the personal cloud

... control. The owner of a personal cloud might want to share some of her documents with other users or ...customize the sharing of her documents by adding a personalized access control (AC) ... Voir le document complet

48

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... computing, Secure Multi-Party Computations (MPC) have been adapted to databases ...Using secure hardware, TrustedPals [9,12] makes MPC more scalable, but their goal and security assumptions differ from ... Voir le document complet

14

DISPERS: Securing Highly Distributed Queries on Personal Data Management Systems

DISPERS: Securing Highly Distributed Queries on Personal Data Management Systems

... query in DISPERS, we first need to obtain the list of node addresses that match the target ...requires the maintenance of a profile index that associates profile concepts to node ...addresses. ... Voir le document complet

5

CLOUDTHINK: A SCALABLE SECURE PLATFORM FOR MIRRORING TRANSPORTATION SYSTEMS IN THE CLOUD

CLOUDTHINK: A SCALABLE SECURE PLATFORM FOR MIRRORING TRANSPORTATION SYSTEMS IN THE CLOUD

... succeed in becoming a de-facto telematics standard, CloudThink depends to a large part on a swift, wide- spread adoption from drivers, vehicle manufacturers, re- search teams and third-party ...achieve ... Voir le document complet

9

ID based cryptography for secure cloud data storage

ID based cryptography for secure cloud data storage

... of cloud data storage ...to cloud storage due to the fact that clients’ data reside among distributed public ...where the confidential information ...or personal information ... Voir le document complet

9

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... for the adoption of Personal Data Management Systems managed under individual's control while keeping the capability to cross personal data of multiple individuals ...measures, the risk ... Voir le document complet

14

MILo-DB: a personal, secure and portable database machine

MILo-DB: a personal, secure and portable database machine

... ), Secure Tokens (STs) share similar characteris- tics (low-power, cheap, highly portable, highly secure), holding the promise of a real breakthrough in the management of ... Voir le document complet

28

DISPERS: Securing Highly Distributed Queries on Personal Data Management Systems

DISPERS: Securing Highly Distributed Queries on Personal Data Management Systems

... query in DISPERS, we first need to obtain the list of node addresses that match the target ...requires the maintenance of a profile index that associates profile concepts to node ...addresses. ... Voir le document complet

5

Privacy-Preserving Queries on Highly Distributed Personal Data Management Systems

Privacy-Preserving Queries on Highly Distributed Personal Data Management Systems

... CONCLUSION Personal Data Management Systems arrive at a rapid pace allowing users to share their personal data within large P2P ...While the benefits are unquestionable, the important risks of ... Voir le document complet

3

Secure and Efficient Approximate Nearest Neighbors Search

Secure and Efficient Approximate Nearest Neighbors Search

... 2 The curious Server has two possibilities for running k- ANN searches within the ...but the database vectors are improper because they are not quantizations onto C U ...measure the average ... Voir le document complet

7

SEP2P: Secure and Efficient P2P Personal Data Processing

SEP2P: Secure and Efficient P2P Personal Data Processing

... is the case when any node can trigger a ...signature: the security cost is ...protocol in terms of security is challenging in a decentralized architecture (without any supporting trusted ... Voir le document complet

13

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... computing, Secure Multi-Party Computations (MPC) have been adapted to databases ...Using secure hardware, TrustedPals [9,12] makes MPC more scalable, but their goal and security assumptions differ from ... Voir le document complet

14

SEP2P: Secure and Efficient P2P Personal Data Processing

SEP2P: Secure and Efficient P2P Personal Data Processing

... used in many smart city applications for urban monitoring such as traffic mon- itoring ...evaluating the quality of road in- frastructures, finding available parking spaces or noise mapping ...[36]. ... Voir le document complet

13

SEP2P: Secure and Efficient P2P Personal Data Processing

SEP2P: Secure and Efficient P2P Personal Data Processing

... used in many smart city applications for urban monitoring such as traffic mon- itoring ...evaluating the quality of road in- frastructures, finding available parking spaces or noise mapping ...[36]. ... Voir le document complet

13

Secure Personal Data Servers: a Vision Paper

Secure Personal Data Servers: a Vision Paper

... Converting the PDS vision into reality introduces important challenges. First, the SPT, central element of the approach, exhibits strong hardware ...rules in a PDS-based information system, ... Voir le document complet

12

Secure and Distributed Computations for a Personal Data Management System

Secure and Distributed Computations for a Personal Data Management System

... data in PDMS increases user control over data, in the PDMS context collaborative use of data is often ...overlooked. The benefits derived from exploiting data are ...send personal data ... Voir le document complet

3

Contrôle d’Accès Sécurisé dans l’Info-Nuage Mobile (Secure Access Control in Mobile Cloud)

Contrôle d’Accès Sécurisé dans l’Info-Nuage Mobile (Secure Access Control in Mobile Cloud)

... mobile cloud users has been studied in [ 56 , 7 , 8 , 65 , 66 ...control in which servers are trusted. The scheme uses onion encryption to increase the security and decrease trust level ... Voir le document complet

151

Energy-Aware Massively Distributed Cloud Facilities: The DISCOVERY Initiative

Energy-Aware Massively Distributed Cloud Facilities: The DISCOVERY Initiative

... Among the on-going actions, two are related to ...analyzing the energy footprint of OpenStack in order to identify critical ...of the massively distributed Cloud architecture ... Voir le document complet

3

Cost models for distributed pattern mining in the cloud: application to graph patterns

Cost models for distributed pattern mining in the cloud: application to graph patterns

... example In order to illustrate our cost models, we rely on a frequent subgraph mining ...of the graph represent people and edges represent interactions between ...examine the community networks ... Voir le document complet

16

Show all 10000 documents...