• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,266
Next 10 →

Attribute-based encryption for fine-grained access control of encrypted data

by Vipul Goyal, Amit Sahai, Omkant Pandey, Brent Waters - In Proc. of ACMCCS’06 , 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract - Cited by 522 (23 self) - Add to MetaCart
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We

Strongly Elliptic Systems and Boundary Integral Equations

by William Mclean , To Meg , 2000
"... Partial differential equations provide mathematical models of many important problems in the physical sciences and engineering. This book treats one class of such equations, concentrating on methods involving the use of surface potentials. It provides the first detailed exposition of the mathematic ..."
Abstract - Cited by 501 (0 self) - Add to MetaCart
research literature on boundary element methods. Cambridge University Press has no responsibility for the persistence or accuracy of URLs for external or third-party internet websites referred to in this publication, and does not guarantee that any content on such websites is, or will remain, accurate

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - In INFOCOM , 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract - Cited by 135 (1 self) - Add to MetaCart
with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA

Cloud Storage Security Using Encryption and Third- Party Storage Auditing Service

by Rana M Pir
"... Abstract- Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and the software's physical hosting location, hardware specifications, efficiency of data processing. Cloud computing is a model for enabling convenie ..."
Abstract - Add to MetaCart
burden of user we have public audit ability for cloud data storage. For that we use external audit party to check integrity of outsource data. We introduce third party auditor (TPA) for audit outsourced data without demanding local copy of user. No additional online burden for the cloud user and that can

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

by Amal Jose , M Sambath , S Ravi
"... ABSTRACT: Cloud Computing is the next-generation architecture of computing. It moves the software and databases to the large data centers, where the management of the data and services can face a number of challenges. By outsourcing data, users are free from the burden of local data storage and mai ..."
Abstract - Add to MetaCart
and maintenance. However, since the users does not have physical possession of large size of outsourced data makes the data integrity protection in cloud computing a very challenging task for users. So public auditability for cloud data storage security is important where users can entrust an external audit party

Privacy-Preserving Public Auditing In Cloud Storage Security

by D. Srinivas
"... computing utility, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under differ ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor to check the integrity of outsourced data. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data

Network Traffic Auditing and Assessment in Cloud Environment 1

by Mansi Goyal, Richa Chhabra
"... Abstract: Cloud computing permits users to remotely store their information into the cloud and provides on-demand applications and services from a shared pool of configurable resources. The protection of the outsourced information within the cloud is dependent on the protection of the cloud computer ..."
Abstract - Add to MetaCart
to an external audit party to verify the info security on the network between cloud provider and its users. This paper confers the following important technologies needed to research network traffic in the cloud computing domain: IP geolocation of network appliances between cloud supplier and its users

SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes

by Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig - SOSP'07 , 2007
"... We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel mode over the entire system lifetime. This protects the kernel against code injection attacks, such as kernel rootkits. SecV ..."
Abstract - Cited by 217 (10 self) - Add to MetaCart
and manual audit, thereby making it possible to rule out known classes of vulnerabilities. To this end, SecVisor offers small code size and small external interface. We rely on memory virtualization to build SecVisor and implement two versions, one using software memory virtualization and the other using CPU

2001b). “The Regulation and Supervision of Bank Around the World: A New Database

by James R. Barth, Ross Levine - in Robert E. Litan and Richard Herring, Editors, Integrating Emerging Market Countries into the Global Financial System, Brookings-Wharton Papers on Financial Services, Brookings Institution
"... Kaufman and other participants at the January 2001 Brookings-Wharton Papers on Financial Services, 4 th Annual Conference, "Integrating Emerging Market Countries Into Global Financial System, " are gratefully acknowledged. This research could not have been completed without the help of Iff ..."
Abstract - Cited by 209 (28 self) - Add to MetaCart
, external auditing requirements, deposit insurance scheme characteristics, loan classification and provisioning requirements,

A Survey on Enabling Privacy for Secure Cloud Storage by Batch Auditing

by Alluri Uday Kumar, Rajeev Bilagi
"... The Cloud computing is a newest technology which Provides various services through internet. Where users can remotely store their data into the cloud, User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about st ..."
Abstract - Add to MetaCart
for cloud data storage security is of critical importance so that users can resort to an external audit party Third Party Auditor (TPA) to check the integrity of outsourced data when needed. Here the TPA can perform batch auditing, handling multiple audit on a single time so it reduces computation overhead
Next 10 →
Results 1 - 10 of 2,266
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University