Storing shared data on the cloud via security-mediator

B Wang, SSM Chow, M Li, H Li - 2013 IEEE 33rd International …, 2013 - ieeexplore.ieee.org
Data owners and data users … data storage and sharing services to data owners and data
users. Both the cloud server and data users are public verifiers, who are not the owner of data

[BOEK][B] Intelligence and security informatics for international security: Information sharing and data mining

H Chen - 2006 - books.google.com
security and various data and technical challenges, we believe there is a pressing need
to develop the science of "Intelligence and Security … in public safety and national security. …

Design of a software architecture supporting business-to-government information sharing to improve public safety and security: Combining business rules, Events and …

S Engelenburg, M Janssen, B Klievink - Journal of Intelligent information …, 2019 - Springer
… It also means that the information sharing process must be … sharing architecture to provide
for an information sharing process … sharing architecture that will protect safety and security and …

Improving security and efficiency in attribute-based data sharing

J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
… Thus, the major benefit of this approach is to largely reduce the need for processing and
storing public key certificates under traditional public key infrastructure (PKI). However, the …

Predicting social security numbers from public data

A Acquisti, R Gross - … of the National academy of sciences, 2009 - National Acad Sciences
… close birthdates and identical state of SSN assignment are likely to share similar SSNs. It
employs the DMF as a public source of information about SSNs assigned over time and across …

PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities

I Makhdoom, I Zhou, M Abolhasan, J Lipman, W Ni - Computers & Security, 2020 - Elsevier
… owners (which are delegated PKG) create a distinctive public-private key pair for each smart
contract they initiate to share data with a service provider or a data processor. Moreover, the …

An analysis and classification of public information security data sources used in research and practice

C Sauerwein, I Pekaric, M Felderer, R Breu - Computers & security, 2019 - Elsevier
security data sources, ranging from inter-organizational threat intelligence sharing platforms
to public information security data … about these public information security data sources, their …

Public integrity auditing for dynamic data sharing with multiuser modification

J Yuan, S Yu - … on Information Forensics and Security, 2015 - ieeexplore.ieee.org
… , data integrity auditing can be performed not only by data … or any general user who has
public keys of the system. In this … efficient public integrity auditing scheme for cloud data sharing

[BOEK][B] Information sharing and data protection in the area of freedom, security and justice: Towards harmonised data protection principles for information exchange …

F Boehm - 2011 - books.google.com
Data processing in these areas was for a long time exclusively governed by the aforementioned
public international law instruments of the Council of Europe.26 In November 2008, the …

Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network

X Zhang, X Chen - Ieee Access, 2019 - ieeexplore.ieee.org
… Each node can verify the validity of the transaction signature based on the public key in the
distributed network, so there is no trust consensus between them. Consensus algorithms rely …