Gotowa bibliografia na temat „CLOUD OF SECRECY”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CLOUD OF SECRECY”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "CLOUD OF SECRECY"
Gosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh i Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Pełny tekst źródłaAnjaneyulu, GSGN, Yogendra Singh Sisodiya i Kumar Saurav. "Novel Composite Encryption for Secrecy in Cloud Computing". Research Journal of Pharmacy and Technology 9, nr 9 (2016): 1501. http://dx.doi.org/10.5958/0974-360x.2016.00292.4.
Pełny tekst źródłaRajkumar, N., i E. Kannan. "Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model". Journal of Circuits, Systems and Computers 29, nr 02 (9.05.2019): 2030001. http://dx.doi.org/10.1142/s0218126620300019.
Pełny tekst źródłaK, Sudha, i Dr Umarani C. "Security Framework for Cloud Information under Transparency of a Key". International Journal for Research in Applied Science and Engineering Technology 10, nr 4 (30.04.2022): 1429–36. http://dx.doi.org/10.22214/ijraset.2022.41550.
Pełny tekst źródłaPark, Junyoung, i Eui-Nam Huh. "eCLASS: Edge-Cloud-Log Assuring-Secrecy Scheme for Digital Forensics". Symmetry 11, nr 10 (22.09.2019): 1192. http://dx.doi.org/10.3390/sym11101192.
Pełny tekst źródłaNagaraju, Dr Sabout, S. K. V. Jayakumar i C. Swetha Priya. "Efficient Multi-linear Key Pairing Cryptosystem for Reliable Cloud-based Service Provisioning". Revista Gestão Inovação e Tecnologias 11, nr 4 (13.08.2021): 4440–55. http://dx.doi.org/10.47059/revistageintec.v11i4.2471.
Pełny tekst źródłaKhan, Yunus, i Sunita Verma. "An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment". Scientific Programming 2021 (29.09.2021): 1–19. http://dx.doi.org/10.1155/2021/7294206.
Pełny tekst źródłaAgarkhed, Jayashree, i R. Ashalatha. "Data Privacy and Security in Cloud Environment Using Cryptography Approach". Asian Journal of Computer Science and Technology 7, nr 1 (5.05.2018): 50–54. http://dx.doi.org/10.51983/ajcst-2018.7.1.1830.
Pełny tekst źródłaQin, Bo, Huaqun Wang, Qianhong Wu, Jianwei Liu i Josep Domingo-Ferrer. "Simultaneous authentication and secrecy in identity-based data upload to cloud". Cluster Computing 16, nr 4 (23.04.2013): 845–59. http://dx.doi.org/10.1007/s10586-013-0258-7.
Pełny tekst źródłaSrilakshmi, K., i P. Bhargavi. "Cloud Computing Security Using Cryptographic Algorithms". Asian Journal of Computer Science and Technology 8, S3 (5.06.2019): 76–80. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2082.
Pełny tekst źródłaRozprawy doktorskie na temat "CLOUD OF SECRECY"
Cornejo-Ramirez, Mario. "Security for the cloud". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Pełny tekst źródłaCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
ALSHIDDI, REEM SAAD. "THE IMPLEMENTATION OF SOCIAL SECRET SHARING IN CLOUD COMPUTING". OpenSIUC, 2015. https://opensiuc.lib.siu.edu/theses/1626.
Pełny tekst źródłaAttasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud". Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Pełny tekst źródłaCloud business intelligence is an increasingly popular solution to deliver decision support capabilities via elastic, pay-per-use resources. However, data security issues are one of the top concerns when dealing with sensitive data. Many security issues are raised by data storage in a public cloud, including data privacy, data availability, data integrity, data backup and recovery, and data transfer safety. Moreover, security risks may come from both cloud service providers and intruders, while cloud data warehouses should be both highly protected and effectively refreshed and analyzed through on-line analysis processing. Hence, users seek secure data warehouses at the lowest possible storage and access costs within the pay-as-you-go paradigm.In this thesis, we propose two novel approaches for securing cloud data warehouses by base-p verifiable secret sharing (bpVSS) and flexible verifiable secret sharing (fVSS), respectively. Secret sharing encrypts and distributes data over several cloud service providers, thus enforcing data privacy and availability. bpVSS and fVSS address five shortcomings in existing secret sharing-based approaches. First, they allow on-line analysis processing. Second, they enforce data integrity with the help of both inner and outer signatures. Third, they help users minimize the cost of cloud warehousing by limiting global share volume. Moreover, fVSS balances the load among service providers with respect to their pricing policies. Fourth, fVSS improves secret sharing security by imposing a new constraint: no cloud service provide group can hold enough shares to reconstruct or break the secret. Five, fVSS allows refreshing the data warehouse even when some service providers fail. To evaluate bpVSS' and fVSS' efficiency, we theoretically study the factors that impact our approaches with respect to security, complexity and monetary cost in the pay-as-you-go paradigm. Moreover, we also validate the relevance of our approaches experimentally with the Star Schema Benchmark and demonstrate its superiority to related, existing methods
Wasim, Muhammad Umer <1979>. "Design and Implementation of Legal Protection for Trade Secrets in Cloud Brokerage Architectures relying on Blockchains". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8294/1/WASIM_MUHAMMAD%20UMER__tesi.pdf.
Pełny tekst źródłaFramner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study". Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Pełny tekst źródłaPRISMACLOUD
Adeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust". Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Pełny tekst źródłaWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems". UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Pełny tekst źródłaCHENG, JUI-JUNG, i 鄭瑞榮. "A Study of Reasonable Measures to Maintain Secrecy in Trade Secret Law-Towards Cloud Computing". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2u7b5d.
Pełny tekst źródła世新大學
智慧財產權研究所(含碩專班)
104
“The owners have taken reasonable measures to maintain confidentiality” means trade secrets owners objectively take certain behaviors, and let others know that they have intents to protect these information as secrets. There are no legal regulations to decide that whether the measures taken by trade secrets owners are achieved “reasonable” degree or not. It is usually judged by kinds and nature of cases. Although experts and scholars propose specific measures to define that what reasonable measures taken for maintain confidentiality are, they lack of complete thinking and structure. Take possible four stages of business secrets losses summarized by the “Institute for Information Industry”: 1. internal operation; 2. external negotiation; 3. external negotiation afterwards; 4. during dispute process for example, we can learn it form them that what completely reasonable maintain confidentiality are. In addition to traditionally protecting facilities and signing “confidentiality agreements” for protecting business trade secrets, some preventive and remedial reasonable measures include to sign “non-compete agreements” and claim for “confidentiality protective orders,” and so on. At present, enterprises often use cloud computing to storage business secrets, so this thesis attempts to study legal risks of trade secrets losses resulting from insufficient protections of cloud service providers. This study also makes suggestions for research results for enterprises to establish completely reasonable maintain secrets measures and give references to the relevant government agencies. Keyword︰ trade secret, reasonable maintain secrets measures,confidentiality agreements,non-compete agreements,confidentiality protective orders,cloud computing
Li, Jian-Ming, i 李堅銘. "Secret Image Sharing over Distributed Cloud Network". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/j62pu2.
Pełny tekst źródła國立東華大學
資訊工程學系
106
In 1979, Shamir published a landmark paper that a (k, n)-Secret Sharing (SS) hiding a secret data in the constant term of a (k-1)-degree polynomial. Accordingly, by using Shamir’s (k, n)-SS, Thien and Lin extended SS to share digital images. This secret image sharing (SIS) scheme is an important research area combining methods and techniques coming from cryptography and image processing. In (k, n)-SIS scheme a secret image is subdivided into n shadow images (referred to as shadows). By using any k or more than k shadows, the secret image can be recovered. However, any (k-1) or fewer than (k-1) shares cannot obtain any secret information. Up to date, there are many SIS schemes with specific features, e.g., providing authentication, progressive reconstruction, meaningful shadows, sharing multiple secrets. In addition, the SIS schemes with specific thresholds, (t, s, k, n)-SIS scheme and (t, k, n)-SIS scheme, were also studied. Due to the fast growth of cloud network, users may outsource their data to cloud servers. However, the major concern is that the security and privacy should be assured from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we study the public reconstruction of (k, n)-SIS scheme over distributed cloud network (DCN). In fact, all previous (k, n)-SIS schemes do not deal with public reconstruction of SIS scheme over DCN. Obviously, to enable secure reconstruction over DCN, we need secure communication among all involved participants holding shadows. A naive implementation of secure communication is using an extra key management protocol to deliver a common key to all participants. In this thesis, we use multi-variate symmetric polynomial to obtain public reconstruction of SIS scheme over DCN (SISDCN), which still has the threshold property (recover the secret image from any k shadows) and meanwhile provides secure reconstruction over DCN. Our SISDCN may noninteractively share a common key that establish secure communication among any k participants.
Lin, Cheng-Ting, i 林正庭. "A Secret-Sharing-Based Method for Cloud Storage System". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69726621877613632163.
Pełny tekst źródła國立中山大學
資訊工程學系研究所
104
In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many information security issues. The technical of secret sharing is applied to solve these problem include data privacy, data integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to cloud storage system, there are two fetal problems. When we upload the file to the cloud storage system, the size of each share equals to the file such that it waste amount of storage to save these shares; furthermore, a heavy computational cost is required to make shares which is going to be saved in the cloud servers. Therefore, we then proposed a secret-sharing-based method by generating pseudo-random number to replace the real shares such that it reduces the storage cost; in addition, we use just EXCLUSIVE-OR (XOR) operation to reduce the computational cost when computing the shares for each cloud servers.
Książki na temat "CLOUD OF SECRECY"
Dreece, Adam. The man of cloud 9. Calgary: ADZO Publishing Inc., 2016.
Znajdź pełny tekst źródłaSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec: Éditions Y. Blais, 2013.
Znajdź pełny tekst źródłaKetchup clouds. Bath: Galaxy, 2013.
Znajdź pełny tekst źródłaOnce the clouds have gone. Valley Falls, NY: Bold Strokes Books, 2014.
Znajdź pełny tekst źródłaKetchup clouds: A novel. New York: Little, Brown and Company, 2013.
Znajdź pełny tekst źródłaYun de ao mi: Taiwan pian : Secrets of the cloud II. Taibei Xian Xindian Shi: Ren ren, 2002.
Znajdź pełny tekst źródłaCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. Totowa, N.J: Rowman & Littlefield, 1988.
Znajdź pełny tekst źródłaCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. Savage, Md: Rowman & Littlefield, 1990.
Znajdź pełny tekst źródłaCole, Leonard A. Clouds of Secrecy: The Army's Germ Warfare Tests Over Populated Areas. Totowa, N.J: Rowman & Littlefield, 1988.
Znajdź pełny tekst źródłaCole, Leonard A. Clouds of secrecy: The army's germ warfare tests over populated areas. London: Rowman & Littlefield, 1990.
Znajdź pełny tekst źródłaCzęści książek na temat "CLOUD OF SECRECY"
Patgiri, Ripon, Malaya Dutta Borah i Laiphrakpam Dolendro Singh. "Data Secrecy: Why Does It Matter in the Cloud Computing Paradigm?" W Modeling, Simulation and Optimization, 549–60. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0836-1_42.
Pełny tekst źródłaGopika, L., V. K. Kavitha, B. Radhakrishnan i Padma Suresh Lekshmi Kanthan. "Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy". W Soft Computing Systems, 335–42. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1936-5_36.
Pełny tekst źródłaSeele, Peter, i Lucas Zapf. "Conclusion: Our Secrets Behind the Cloud". W Behind the Cloud, 175–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_6.
Pełny tekst źródłaSeele, Peter, i Lucas Zapf. "Outlook: Digital Authenticity: Immersive Consumption Without Secrets". W Behind the Cloud, 185–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_7.
Pełny tekst źródłaGarbarino, Ernesto. "ConfigMap and Secrets". W Beginning Kubernetes on the Google Cloud Platform, 155–90. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5491-2_5.
Pełny tekst źródłaWang, Ming-Ming, Zhi-Guo Qu i Mohamed Elhoseny. "Quantum Secret Sharing in Noisy Environment". W Cloud Computing and Security, 100–112. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_9.
Pełny tekst źródłaDolev, Shlomi, i Yin Li. "Secret Shared Random Access Machine". W Algorithmic Aspects of Cloud Computing, 19–34. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29919-8_2.
Pełny tekst źródłaSeele, Peter, i Lucas Zapf. "Summary: Thoughts in a Digital World: Free, but no Longer Secret". W Behind the Cloud, 169–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64502-4_5.
Pełny tekst źródłaHofheinz, Dennis, i Eike Kiltz. "Scalable Cryptography". W Lecture Notes in Computer Science, 169–78. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21534-6_9.
Pełny tekst źródłaWang, Ming-Ming, Lu-Ting Tian i Zhi-Guo Qu. "Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System". W Cloud Computing and Security, 23–31. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_3.
Pełny tekst źródłaStreszczenia konferencji na temat "CLOUD OF SECRECY"
Manohar, S., Manohar Vignesh i Gabrielle Margaret Prabhu. "Sensitive Data Transaction Using RDS in AWS". W International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-3z1665.
Pełny tekst źródłaReddy P., Muthi, Rekha Rangappa Dasar, R. Tanuja, S. H. Manjula i K. R. Venugopal. "Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization". W 2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2018. http://dx.doi.org/10.1109/wocn.2018.8556130.
Pełny tekst źródłaOgiela, Marek R., Lidia Ogiela i Urszula Ogiela. "Intelligent Bio-inspired Approach for Secrecy Management in the Cloud". W 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2014. http://dx.doi.org/10.1109/3pgcic.2014.78.
Pełny tekst źródłaMarina, Ninoslav, Natasha Paunkoska i Aneta Velkoska. "Improved bounds on secrecy capacity in twin-code cloud storage framework". W 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2016. http://dx.doi.org/10.1109/icumt.2016.7765384.
Pełny tekst źródłaYoo, Seungmin, Jeongwan Koh, Donggu Kim i Joonhyuk Kang. "Cloud and Edge Processing by Precoder Design for Secrecy Rate Maximization". W 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2019. http://dx.doi.org/10.1109/ccnc.2019.8651780.
Pełny tekst źródłaPatgiri, Ripon, Malaya Dutta Borah i Laiphrakpam Dolendro Singh. "SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data". W 2021 26th IEEE Asia-Pacific Conference on Communications (APCC). IEEE, 2021. http://dx.doi.org/10.1109/apcc49754.2021.9609895.
Pełny tekst źródłaWang, Li, Tenghui Ke, Mei Song, Yifei Wei i Yinglei Teng. "Research on secrecy capacity oriented relay selection for mobile cooperative networks". W 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045106.
Pełny tekst źródłaXiao, Chen, Zhu Yan, Yin Xinxing, Li Fangbiao, Xue Zhi, Zhou Yongkai i Pang Liang. "Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination". W 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.117.
Pełny tekst źródłaYan, Zhu, Chen Xiao, Zhou Yongkai, Li Fangbiao, Pang Liang, Yin Xinxing i Xue Zhi. "Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper". W 1st International Workshop on Cloud Computing and Information Security. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.19.
Pełny tekst źródłaKumar, Naveen, Anish Mathuria i Manik Lal Das. "Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System". W 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.513.
Pełny tekst źródła