Sciweavers

2272 search results - page 227 / 455
» Provable Data Privacy
Sort
View
85
Voted
FAST
2003
15 years 2 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
93
Voted
CSUR
2010
373views more  CSUR 2010»
14 years 10 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
117
Voted
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
15 years 6 months ago
An Encrypted, Content Searchable Scalable Distributed Data Structure
Scalable Distributed Data Structures (SDDS) store data in a file of key-based records distributed over many storage sites. The number of storage sites utilized grows and shrinks w...
Thomas J. E. Schwarz, Peter Tsui, Witold Litwin
79
Voted
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Integrated Health Log: Share Multimedia Patient Data
The Integrated Health Log demonstrator shows how multimedia can be used in collaborative settings in healthcare. Patient data can be shared annotated discussed and processed by me...
Rogier Brussee, Paul Porskamp, Leon van den Oord, ...
SDMW
2004
Springer
15 years 6 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker