Results 1 - 10
of
668
Illusion and well-being: A social psychological perspective on mental health.
- Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract
-
Cited by 988 (20 self)
- Add to MetaCart
, whereas the individual whose vision is clouded by illusion is regarded as vulnerable to, if not already a victim of, mental illness. Despite its plausibility, this viewpoint is increasingly difficult to maintain (cf. Lazarus, 1983). A substantial amount of research testifies to the prevalence of illusion
Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing
"... Abstract — Cloud storage facilitates users to store data remotely and benefits enterprise network or organization by minimizing the complexity of local hardware and software management. Despite the understandable on-demands, an infrastructure based services exposes user physical possession of outsou ..."
Abstract
- Add to MetaCart
scoring coded data. ESSSA method supports reliable user access to cloud storage with better quality communication and reduced computation cost. The auditing outcome not only guarantees robust cloud storage accuracy assurance, but at the same time achieves quick data fault localization through detection
Hail: A high-availability and integrity layer for cloud storage,” in
- Proc. Of CCS’09,
, 2009
"... ABSTRACT We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic and d ..."
Abstract
-
Cited by 195 (4 self)
- Add to MetaCart
and distributed-systems communities. Proofs in HAIL are efficiently computable by servers and highly compact-typically tens or hundreds of bytes, irrespective of file size. HAIL cryptographically verifies and reactively reallocates file shares. It is robust against an active, mobile adversary, i.e., one that may
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
, 2005
"... Abstract. In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server or network ..."
Abstract
-
Cited by 170 (8 self)
- Add to MetaCart
Abstract. In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server
Secure Cloud Storage with Controlled Data Access, Assured Deletion and Data Forwarding
"... Abstract- A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality and to reduce data management costs. However, we must provide security ..."
Abstract
- Add to MetaCart
security guarantees for the outsourced data. We design and implement a secure cloud storage system that achieves fine-grained, policybased access control file assured deletion and secure data forwarding to specified users. It associates outsourced files with file access policies, assuredly deletes files
Security of Data Storage in Cloud Computing
"... With the advent of Information Technology in day-to-day activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This lead to the rise of a new concept, the Cloud Computing. The Internet users rely heavily on the Cloud Computing for various comp ..."
Abstract
- Add to MetaCart
Providers. The Cloud Providers assures the consumer of the Cloud that the data stored on their servers is safe. The consumer plays no role in securing the data. The various cloud providers claim that they provide highly secure cloud storage. But there have been attacks on hot-shot cloud providing companies
Robust and Flexible Power-Proportional Storage
"... Power-proportional cluster-based storage is an important component of an overall cloud computing infrastructure. With it, substantial subsets of nodes in the storage cluster can be turned off to save power during periods of low utilization. Rabbit is a distributed file system that arranges its data- ..."
Abstract
-
Cited by 57 (7 self)
- Add to MetaCart
Power-proportional cluster-based storage is an important component of an overall cloud computing infrastructure. With it, substantial subsets of nodes in the storage cluster can be turned off to save power during periods of low utilization. Rabbit is a distributed file system that arranges its data
Securing Data in Cloud Storage with File Assured Deletion
"... Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data ..."
Abstract
- Add to MetaCart
Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data
Secure Cloud Storage with File Assured Deletion
"... Abstract — When we outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. We tried to solve this issue by designing FADE(File Assured Deletion), a practical, implem ..."
Abstract
- Add to MetaCart
Abstract — When we outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. We tried to solve this issue by designing FADE(File Assured Deletion), a practical
FADE: Secure Overlay Cloud Storage with File Assured Deletion”,
, 2010
"... Abstract. While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage s ..."
Abstract
-
Cited by 28 (1 self)
- Add to MetaCart
working prototype of FADE atop Amazon S3, one of today's cloud storage services, and empirically show that FADE provides policy-based file assured deletion with a minimal trade-off of performance overhead. Our work provides insights of how to incorporate value-added security features into current
Results 1 - 10
of
668