Sciweavers

12 search results - page 3 / 3
» Secure Ranked Keyword Search over Encrypted Cloud Data
Sort
View
131
Voted
SRDS
2010
IEEE
14 years 11 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
102
Voted
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 7 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....