Storing shared data on the cloud via security-mediator
… Data owners and data users … data storage and sharing services to data owners and data
users. Both the cloud server and data users are public verifiers, who are not the owner of data …
users. Both the cloud server and data users are public verifiers, who are not the owner of data …
[BOEK][B] Intelligence and security informatics for international security: Information sharing and data mining
H Chen - 2006 - books.google.com
… security and various data and technical challenges, we believe there is a pressing need
to develop the science of "Intelligence and Security … in public safety and national security. …
to develop the science of "Intelligence and Security … in public safety and national security. …
Design of a software architecture supporting business-to-government information sharing to improve public safety and security: Combining business rules, Events and …
… It also means that the information sharing process must be … sharing architecture to provide
for an information sharing process … sharing architecture that will protect safety and security and …
for an information sharing process … sharing architecture that will protect safety and security and …
Improving security and efficiency in attribute-based data sharing
J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
… Thus, the major benefit of this approach is to largely reduce the need for processing and
storing public key certificates under traditional public key infrastructure (PKI). However, the …
storing public key certificates under traditional public key infrastructure (PKI). However, the …
Predicting social security numbers from public data
A Acquisti, R Gross - … of the National academy of sciences, 2009 - National Acad Sciences
… close birthdates and identical state of SSN assignment are likely to share similar SSNs. It
employs the DMF as a public source of information about SSNs assigned over time and across …
employs the DMF as a public source of information about SSNs assigned over time and across …
PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
… owners (which are delegated PKG) create a distinctive public-private key pair for each smart
contract they initiate to share data with a service provider or a data processor. Moreover, the …
contract they initiate to share data with a service provider or a data processor. Moreover, the …
An analysis and classification of public information security data sources used in research and practice
… security data sources, ranging from inter-organizational threat intelligence sharing platforms
to public information security data … about these public information security data sources, their …
to public information security data … about these public information security data sources, their …
Public integrity auditing for dynamic data sharing with multiuser modification
… , data integrity auditing can be performed not only by data … or any general user who has
public keys of the system. In this … efficient public integrity auditing scheme for cloud data sharing …
public keys of the system. In this … efficient public integrity auditing scheme for cloud data sharing …
[BOEK][B] Information sharing and data protection in the area of freedom, security and justice: Towards harmonised data protection principles for information exchange …
F Boehm - 2011 - books.google.com
… Data processing in these areas was for a long time exclusively governed by the aforementioned
public international law instruments of the Council of Europe.26 In November 2008, the …
public international law instruments of the Council of Europe.26 In November 2008, the …
Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network
X Zhang, X Chen - Ieee Access, 2019 - ieeexplore.ieee.org
… Each node can verify the validity of the transaction signature based on the public key in the
distributed network, so there is no trust consensus between them. Consensus algorithms rely …
distributed network, so there is no trust consensus between them. Consensus algorithms rely …
Gerelateerde zoekopdrachten
- dynamic data public integrity auditing
- public auditing for shared data
- shared data security mediator
- cloud data public auditing scheme
- information sharing data protection
- secure data storage
- homeland security data mining
- consortium blockchain data security sharing
- information sharing data mining
- public data social security numbers
- personal health data secure sharing
- secure and decentralized sharing iot data
- government data sharing
- data sharing service
- public safety and security
- data sharing scheme