• No results found

[PDF] Top 20 Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments

Has 10000 "Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments" found on our website. Below are the top 20 most common "Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments".

Privacy  Preserving  Enforcement  of  Sensitive  Policies  in  Outsourced   and  Distributed  Environments

Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments

... an outsourced environment was initially explored in [19, 20, ...control policies and on the protected ...complex policies where contextual information may be used for granting access ... See full document

188

Preserving Privacy in Outsourced Database

Preserving Privacy in Outsourced Database

... of distributed environment to build their own basic ...Since distributed database has advantages for scalability and ...The outsourced database provider will also use this framework to handle massive ... See full document

6

A review paper on preserving privacy in mobile environments

A review paper on preserving privacy in mobile environments

... the enforcement and policy negotiation between the Web Service and the mobile device before transferring any sensitive information to the ...The privacy tools mechanism focuses on the location ... See full document

26

Privacy-preserving distributed clustering

Privacy-preserving distributed clustering

... be privacy sensitive and/or commercially valuable such that the owners may not want to share their data with any other entity, including the service ...Such privacy concerns lead to trust issues ... See full document

15

Preserving Privacy in Mobile Environments

Preserving Privacy in Mobile Environments

... obligation policies over actions. KAoS policies are descriptions of actions that are per- mitted (or not) or obligated (or not) limiting its expressivity as policies are restricted to ... See full document

164

Privacy-Preserving  Face  Recognition  with  Outsourced  Computation

Privacy-Preserving Face Recognition with Outsourced Computation

... law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted ...of privacy-preserving face ... See full document

9

Privacy Preserving Mechanism for Relational Data

Privacy Preserving Mechanism for Relational Data

... However, sensitive information can still be misused by sanctioned users to compromise the privacy of ...of privacy- preservation for sensitive data can require the enforcement of ... See full document

6

Improved Privacy Preserving decision tree Approach for Network Intrusion Detection

Improved Privacy Preserving decision tree Approach for Network Intrusion Detection

... [8] M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, editors, PKDD, volume 3202 of Lecture Notes in Computer ... See full document

6

Privacy Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

Privacy Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

... for privacy-preserving association rules mining on horizontally distributed ...improves privacy and performance when increasing the number of ... See full document

7

Privacy Preserving Spatial Range Query Over Outsourced Encrypted Data

Privacy Preserving Spatial Range Query Over Outsourced Encrypted Data

...  We propose EPLQ, an efficient solution for privacy preserving spatial range query. In particular, we show that whether a POI matches a spatial range query or not can be tested by examining whether the ... See full document

5

Privacy In Multi-Agent And Dynamical Systems

Privacy In Multi-Agent And Dynamical Systems

... her sensitive information with the rest of the network. Privacy con- cerns can be addressed by managing access ...users’ privacy concerns scale with the distance from ...initial privacy ... See full document

129

Feature Extraction using SIFT for Privacy Preserving Over Encrypted Image

Feature Extraction using SIFT for Privacy Preserving Over Encrypted Image

... of privacy-preserving computation outsourcing over multimedia information has gotten restricted research consideration up until ...late, privacy- preserving information search in the domain of ... See full document

6

Privacy Preservation using On Demand
          Computational of Gain using Vertical Partition

Privacy Preservation using On Demand Computational of Gain using Vertical Partition

... the privacy of the data is also an important ...purposes. Privacy preserving data mining [1], [2], [3] helps to achieve the aim of data mining by preserving the privacy of ... See full document

5

Comparative Study of Smart Phone Security Techniques

Comparative Study of Smart Phone Security Techniques

... policy enforcement system is one solution ...context-related policies to be set (even at runtime) by both the user and authorized third parties locally or ...context-related policies, which can be ... See full document

5

Privacy Preserving Distributed Cloud Storage

Privacy Preserving Distributed Cloud Storage

... simulated distributed cloud ...perform privacy preserving homomorphic encryption scheme on the data partitions and file ...in distributed cloud environment and to retrieve them back using our ... See full document

7

EPiC:  Efficient  Privacy-Preserving  Counting  for  MapReduce

EPiC: Efficient Privacy-Preserving Counting for MapReduce

... Since EPiC’s indicator polynomial based counting technique involves additions and multiplications on ciphertexts, a homomorphic encryption scheme is needed as a build- ing block. While there already exist various schemes ... See full document

18

Public Auditing Using Proxy Resignatures on Efficient User Revocation in the Cloud

Public Auditing Using Proxy Resignatures on Efficient User Revocation in the Cloud

... for Privacy-Preserving Public Auditing in Cloud Computing”, International Journal of Computer science and Technology, ...Ensuring Privacy & Security in Cloud Computing”, Bioinfo Security ... See full document

7

A Survey on Novel Approach for Multi-Authority Attribute-Based Encryption for Data Security

A Survey on Novel Approach for Multi-Authority Attribute-Based Encryption for Data Security

... " Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud "Propose a novel multi- keyword fuzzy search scheme by exploiting the locality-sensitivehashing ... See full document

5

zkLedger:  Privacy-Preserving  Auditing  for  Distributed  Ledgers

zkLedger: Privacy-Preserving Auditing for Distributed Ledgers

... Non-interactive zero-knowledge proofs. To make privacy-preserving assertions about payment details zk- Ledger relies on non-interactive zero-knowledge proofs (NIZKs) [9]. In brief, zero-knowledge proofs ... See full document

16

Augmenting Privacy For E-Wallet Applications Using Ranked Keyword Search

Augmenting Privacy For E-Wallet Applications Using Ranked Keyword Search

... In the setup phase, the data owner first generates public and private key pairs. Then build the index from various keywords obtained from the set of files, then calculate the score of significance and add to the list of ... See full document

8

Show all 10000 documents...