A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
نویسندگان
چکیده
منابع مشابه
A secure mobile DRM system based on cloud architecture
Public cloud architecture offers a public access software service. Users can login to access the cloud resources via various devices. The main advantage of the SaaS (Software as a Service) cloud service is that it supports different software and devices, in order to open web browsers, to authenticate the users through the standard format. E-books are protected by digital rights management (DRM)...
متن کاملA Study on Secure Contents Using in Intelligent Urban Computing
Ubiquitous computing only allows services of fixed or local area and it just provides services without status information of the device upon user request. Thus, it is difficult to react immediately with users changes. Since urban computing is on higher system instead of ubiquitous, it can usually provide users the organic behavior with reference from devices physical states information. Also, i...
متن کاملA Study on Secure Contents Using in Urban Computing
Urban computing provides the services by considering of user’s devices and environments near user’s location. That means that it can be detected their moving by sensor the generated contexts during user moving. And they can guess the user’s next moving through these detected contexts. During user’s moving, there are getting more increase the number of contexts. And the more increase the number ...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
A Study on Secure Data Storage Strategy in Cloud Computing
Based on fundamental theories of k equations in algebra, n congruence surplus principle in elementary number theory, and the Abhishek’s online data storage algorithm, we propose a secure data storage strategy in cloud computing. The strategy splits data d into k sections using the data splitting algorithm, ensures high data security by simplifying k equation solutions, and at the same time, gua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Healthcare Engineering
سال: 2018
ISSN: 2040-2295,2040-2309
DOI: 10.1155/2018/6410180