Sciweavers

40 search results - page 2 / 8
» Achieving trust in IT outsourcing relationships
Sort
View
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 5 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
13 years 10 months ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
ICDE
2009
IEEE
180views Database» more  ICDE 2009»
14 years 6 months ago
Outsourcing Search Services on Private Spatial Data
Social networking and content sharing service providers, e.g., Facebook and Google Maps, enable their users to upload and share a variety of user-generated content, including locat...
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
INFOCOM
2010
IEEE
13 years 3 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
ICICS
2003
Springer
13 years 10 months ago
A Novel Two-Level Trust Model for Grid
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Tieyan Li, Huafei Zhu, Kwok-Yan Lam