• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 668
Next 10 →

Illusion and well-being: A social psychological perspective on mental health.

by Shelley E Taylor , Jonathon D Brown , Nancy Cantor , Edward Emery , Susan Fiske , Tony Green-Wald , Connie Hammen , Darrin Lehman , Chuck Mcclintock , Dick Nisbett , Lee Ross , Bill Swann , Joanne - Psychological Bulletin, , 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract - Cited by 988 (20 self) - Add to MetaCart
, whereas the individual whose vision is clouded by illusion is regarded as vulnerable to, if not already a victim of, mental illness. Despite its plausibility, this viewpoint is increasingly difficult to maintain (cf. Lazarus, 1983). A substantial amount of research testifies to the prevalence of illusion

Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing

by Durairaj Moorthy, Rasekar C
"... Abstract — Cloud storage facilitates users to store data remotely and benefits enterprise network or organization by minimizing the complexity of local hardware and software management. Despite the understandable on-demands, an infrastructure based services exposes user physical possession of outsou ..."
Abstract - Add to MetaCart
scoring coded data. ESSSA method supports reliable user access to cloud storage with better quality communication and reduced computation cost. The auditing outcome not only guarantees robust cloud storage accuracy assurance, but at the same time achieves quick data fault localization through detection

Hail: A high-availability and integrity layer for cloud storage,” in

by Kevin D Bowers , Ari Juels , Alina Oprea - Proc. Of CCS’09, , 2009
"... ABSTRACT We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic and d ..."
Abstract - Cited by 195 (4 self) - Add to MetaCart
and distributed-systems communities. Proofs in HAIL are efficiently computable by servers and highly compact-typically tens or hundreds of bytes, irrespective of file size. HAIL cryptographically verifies and reactively reallocates file shares. It is robust against an active, mobile adversary, i.e., one that may

MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking

by Konrad Lorincz, Matt Welsh , 2005
"... Abstract. In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server or network ..."
Abstract - Cited by 170 (8 self) - Add to MetaCart
Abstract. In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server

Secure Cloud Storage with Controlled Data Access, Assured Deletion and Data Forwarding

by unknown authors
"... Abstract- A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality and to reduce data management costs. However, we must provide security ..."
Abstract - Add to MetaCart
security guarantees for the outsourced data. We design and implement a secure cloud storage system that achieves fine-grained, policybased access control file assured deletion and secure data forwarding to specified users. It associates outsourced files with file access policies, assuredly deletes files

Security of Data Storage in Cloud Computing

by Tania Gaur, Nisha Kharb
"... With the advent of Information Technology in day-to-day activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This lead to the rise of a new concept, the Cloud Computing. The Internet users rely heavily on the Cloud Computing for various comp ..."
Abstract - Add to MetaCart
Providers. The Cloud Providers assures the consumer of the Cloud that the data stored on their servers is safe. The consumer plays no role in securing the data. The various cloud providers claim that they provide highly secure cloud storage. But there have been attacks on hot-shot cloud providing companies

Robust and Flexible Power-Proportional Storage

by Hrishikesh Amur, James Cipar, Varun Gupta, Gregory R. Ganger, Michael A. Kozuch, Karsten Schwan
"... Power-proportional cluster-based storage is an important component of an overall cloud computing infrastructure. With it, substantial subsets of nodes in the storage cluster can be turned off to save power during periods of low utilization. Rabbit is a distributed file system that arranges its data- ..."
Abstract - Cited by 57 (7 self) - Add to MetaCart
Power-proportional cluster-based storage is an important component of an overall cloud computing infrastructure. With it, substantial subsets of nodes in the storage cluster can be turned off to save power during periods of low utilization. Rabbit is a distributed file system that arranges its data

Securing Data in Cloud Storage with File Assured Deletion

by Anandavalli M, L. Mary, Immaculate Sheela, Ph. D
"... Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data ..."
Abstract - Add to MetaCart
Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data

Secure Cloud Storage with File Assured Deletion

by Gousiya Begum, M. Shravya
"... Abstract — When we outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. We tried to solve this issue by designing FADE(File Assured Deletion), a practical, implem ..."
Abstract - Add to MetaCart
Abstract — When we outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. We tried to solve this issue by designing FADE(File Assured Deletion), a practical

FADE: Secure Overlay Cloud Storage with File Assured Deletion”,

by Yang Tang , Patrick P C Lee , John C S Lui , Radia Perlman , 2010
"... Abstract. While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage s ..."
Abstract - Cited by 28 (1 self) - Add to MetaCart
working prototype of FADE atop Amazon S3, one of today's cloud storage services, and empirically show that FADE provides policy-based file assured deletion with a minimal trade-off of performance overhead. Our work provides insights of how to incorporate value-added security features into current
Next 10 →
Results 1 - 10 of 668
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University