• No results found

[PDF] Top 20 Usable assured deletion in the cloud

Has 10000 "Usable assured deletion in the cloud" found on our website. Below are the top 20 most common "Usable assured deletion in the cloud".

Usable assured deletion in the cloud

Usable assured deletion in the cloud

... investigate deletion preferences, 20 active cloud users (divided into four groups of 5 users) were invited to take part in three participatory action research (PAR) activities (Bergold and Thomas 2012, ... See full document

190

Title: Seclusion Search over Encrypted Data in Cloud Storage Services

Title: Seclusion Search over Encrypted Data in Cloud Storage Services

... proposed usable search functionalities, we survey recent research advances, and give insights on the advantages and limitations of each ...searchable cloud storage a ... See full document

8

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

... We propose policy primarily based} file access and policy based file assured deletion for higher access to the files and delete the files that are strong-minded not a lot of. we have a propensity to propose ... See full document

5

A Novel Policy based Technology for Secure Cloud Computing

A Novel Policy based Technology for Secure Cloud Computing

... Overlay Cloud Storage with File Assured Deletionis a user-interactive app on the java ...readilydeployable cloud storage system that focuses on protectingdeleted data with policy-based file ... See full document

7

FINGER PHOTOPLETHYSMOGRAPH AS A MONITORING DEVICE FOR LIPID PROFILE IN MEN WITH 
CARDIOVASCULAR RISK

FINGER PHOTOPLETHYSMOGRAPH AS A MONITORING DEVICE FOR LIPID PROFILE IN MEN WITH CARDIOVASCULAR RISK

... for assured deletion. A recommended approach for file’s assured deletion in the cloud is the use of encryption mechanism, the aim is to encrypt files before outsourcing ...(File ... See full document

9

A Survey Of Different Encryption Techniques For Secure Cloud Storage

A Survey Of Different Encryption Techniques For Secure Cloud Storage

... based assured deletion of ...one cloud two another ...on cloud X and is associated with a policy ...on cloud X by revoking the ... See full document

7

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... the cloud are associated with a set of user-defined file access policies ...file assured deletion [10] ...file assured deletion, assuredly deletes the data files when the associated ... See full document

7

Database Security with Access Control and Assured Deletion Using Cryptographic Key

Database Security with Access Control and Assured Deletion Using Cryptographic Key

... Jelastic cloud server (Jelastic cloud is an open cloud which is utilized to get to the record put away in the jelastic cloud database with legitimate mail id and ...the cloud ... See full document

10

Assured Distribute Data in Cloud Computing using Control Security Model

Assured Distribute Data in Cloud Computing using Control Security Model

... User secret keys is defined to reflect their access structures so that a user is able to decrypt a cipher text if and only if the data file attributes satisfy his access structure. Such a design also brings in the ... See full document

9

POLICY BASED FILE ASSURED DELETION WITH SECURE OVERLAY CLOUD STORAGE

POLICY BASED FILE ASSURED DELETION WITH SECURE OVERLAY CLOUD STORAGE

... public cloud storage serviceshave been ...the cloud storage providers merely provide the storage ...file assured deletion and their operations of cryptographic keys are different from our work ... See full document

8

Secure Cloud Storage with File Assured Deletion

Secure Cloud Storage with File Assured Deletion

... Cryptographic protection on outsourced data storage has been considered (see survey in [8]). For example, Wang et al. [9] propose secure outsourced data access mechanisms that support changes in user access rights and ... See full document

6

Secure Cloud Storage with Controlled Data Access, Assured Deletion and Data Forwarding

Secure Cloud Storage with Controlled Data Access, Assured Deletion and Data Forwarding

... Another important functionality about cloud storage is the function of integrity checking. After a user stores data into the storage system, he no longer possesses the data at hand. The user may want to check ... See full document

5

A Survey on Various Security Techniques to Secure Cloud Data

A Survey on Various Security Techniques to Secure Cloud Data

... In cloud storage system, companies stores their data in the remotely located data ...The cloud storage systems propose an effective and flexible distributed scheme with explicit dynamic data support for ... See full document

8

A middleware for assured clouds

A middleware for assured clouds

... critical cloud computing across hybrid (public, private, het- erogeneous) clouds requires the realization of “end-to-end” and “cross-layered” security, dependability, and ...distributed cloud-computing- ... See full document

8

Architectural Principles and Experimentation of Distributed High Performance Virtual Clusters

Architectural Principles and Experimentation of Distributed High Performance Virtual Clusters

... HPC Application Viability • Running high performance computing workloads in cloud infrastructure is feasible • HPC hardware such as Nvidia GPUs and InfiniBand interconnects now usable in[r] ... See full document

68

Improving Profitability for Cloud Service Providers Using Double Renting Scheme with Assured QOS
P Sindhu & B Lakshman

Improving Profitability for Cloud Service Providers Using Double Renting Scheme with Assured QOS P Sindhu & B Lakshman

... the cloud service platform as a multiserver system with a service request ...the cloud in which a job queuing system such as SGE, PBS, or Condor is ... See full document

6

Safety Assured Reliable Microgrid

Safety Assured Reliable Microgrid

... For a fault on the main distribution network, overcurrent relay protection and balanced earth fault protection were installed at the grid side of the circuits between the main distrib[r] ... See full document

10

Evaluating nighttime CALIOP 0.532 µm aerosol optical depth and extinction coefficient retrievals

Evaluating nighttime CALIOP 0.532 µm aerosol optical depth and extinction coefficient retrievals

... Extinction QC 532 reports on the type of retrieval used for solving extinction (constrained versus unconstrained), whether or not the subject layer was opaque and the result of the process (convergent, divergent or ... See full document

18

Making Passwords Secure and Usable

Making Passwords Secure and Usable

... Problem areas for password usability were multiple passwords, password content, users’ perceptions of security in the organisation and information sensitivity.. 3.2.1 Multiple passwo[r] ... See full document

15

Usable Adaptive Hypermedia Systems

Usable Adaptive Hypermedia Systems

... Compared to the distorting technique, the main disadvantages of stretchtext are: 1 it does not provide any feedback about the quantity and layout of the hidden information; 2 support of [r] ... See full document

19

Show all 10000 documents...