Publisher Correction to: A third-party replication service for dynamic hidden databases

نویسندگان

چکیده

In the original publication of article, figure legends Figs. 2 and 4 were published with an error, due to two missed corrections. The corrections had been provided by authors during proofing process, but typesetters.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Iris: Third-Party Authentication Service

Existing centralized identification systems, such as Facebook or Google, offer convenient services for authentication and storing user information that third-party services leverage to reduce friction and streamline the process of creating user profiles and logging in. However, these systems present conflict of interests, and users may be interested in a third-party service that focuses exclusi...

متن کامل

A Trusted Third-Party Computation Service

We present TEP, a system that supports general-purpose shared computation between mutually-distrusting parties. TEP is useful for applications, such as auctions and tax preparation, that use private information from multiple participants. Such applications cannot be run on any one participant’s computer without sacrificing the other participants’ privacy. TEP acts as a trusted service that host...

متن کامل

Middle managers selection for third-party logistics service providers

Since the selection of middle managers is critical to the development of organizations for third-party logistics service providers (3PLs), how do the organizations of 3PLs select and recruit competent middle managers? The decision-making for middle managers selection poses a multi-criteria problem and faces a fuzzy environment. Hence, the aim of this paper is to develop a fuzzy multiple criteri...

متن کامل

Verifying cloud service-level agreement by a third-party auditor

In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users with elastic computing and storage resources in a pay-as-you-go way. An SLA between the cloud and a user is a contract that specifies the computing resources and performances tha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Service-oriented computing and applications

سال: 2021

ISSN: ['1863-2386', '1863-2394']

DOI: https://doi.org/10.1007/s11761-021-00316-2