Optimal Data Sharing with Forward Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity

Large amount of data sharing has never been less demanding to the advances of cloud computing, and a precise examination on the shared data gives a variety of advantages to both the society and individuals. Data sharing to an expansive number of members must consider a few issues, including effectiveness, data integrity and protection of data owner. Ring signature is a promising contender to de...

متن کامل

Sharing Data for Public Security

Data sharing is a valuable tool for improving security. It allows integrating information from multiple sources to better identify and respond to global security threats. On the other side, sharing of data is limited by privacy and confidentiality. A possible solution is removing or obfuscating part of the data before release (anonymization), and, to this scope, various masking algorithms have ...

متن کامل

Forward Exponential Performances: Pricing and Optimal Risk Sharing

In a Markovian stochastic volatility model, we consider financial agents whose investment criteria are modelled by forward exponential performance processes. The problem of contingent claim indifference valuation is first addressed and a number of properties are proved and discussed. Special attention is given to the comparison between the forward exponential and the backward exponential utilit...

متن کامل

Improving Data Sharing Security in Cloud Computing

Cloud computing has emerged as a new computing paradigm where all IT infrastructure can be outsourced and working as on premise. It offers numerous advantages both for customers and providers and especially at the cost level that is typically low compared to buying your own resources, configuring and managing them. One of the tremendous services is the data sharing and the data storage. Custome...

متن کامل

Improving Data Security in Crypto-based Data Sharing with Third Party Auditing

The encryption standard provides key assumption to the analytical with the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social escrow problem. The key generation center could decrypt any messages addressed to specific users networks or cloud computing, there have been increasing demands and concerns for distributed data security. One of the mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016911892