نتایج جستجو برای: query on encrypted data
تعداد نتایج: 9286813 فیلتر نتایج به سال:
Xu, Huiqi. M.S., Department of Computer Science and Engineering, Wright State University, 2012. kNN-R: Building Secure and Efficient Outsourced kNN Query Service with the RASP encryption. With the wide deployment of public cloud computing infrastructures, outsourcing database services to the cloud has become an appealing solution to save operating expense. However, some databases might be so se...
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and indexes associated with them enable the server to execute queries without the need of accessing cleartext. Cu...
LEI WEI: Privacy-preserving Regular-Expression Evaluation on Encrypted Data (Under the direction of Michael K. Reiter) Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this dissertation we present a family of protocols by which a client can evaluate a regular expression on an encrypted file sto...
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
ion Layer of a database system. TEAL is an implementation of a framework for secure storage and resides inside Abstraction Layer of a database (DBAL). We demonstrate how TEAL integrates transparently into existing applications. Furthermore, we explain query processing on encrypted data by re-using components of the DBAL. Finally, we visualize the impact of the processing steps of TEAL on the ru...
this study was designed and conducted to find out if there is any significant relationship between iranian efl learners preferance for one of the three degrees of obtrusiveness in foreign language instruction (focus on form, forms and meaning) and their preferred experiential learing style. to collect the data two questionnaires were used. the first one on the degree of obtrusiveness and the se...
Resources such as storage and network as a service to organizations and customers in reduced cost by cloud computing. The documents stored in cloud are of huge size and due to its sensitivity arises security and storage problems. Data is stored on remote location in cloud and cryptographic techniques resolve problems of data security. To ensure data to be secure in cloud, the client encrypts da...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید