Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 84
1.
  • Enabling Secure and Efficie... Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
    Wang, Cong; Cao, Ning; Ren, Kui ... IEEE transactions on parallel and distributed systems, 08/2012, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed

    Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public ...
Full text
Available for: IJS, NUK, UL
2.
  • Tiered Access to Research D... Tiered Access to Research Data for Secondary Analysis
    Marcotte, John E; Rush, Sarah; Ogden-Schuette, Kelly The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Research data have expanded in their gradation of the risks associated with both re-identification and harm, which has created a need for multiple levels of access controls beyond public and ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Beyond Legal Frameworks and... Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection
    Pienta, Amy; Jang, Joy; Levenstein, Margaret The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    With a growing demand for data reuse and open data within the scientific ecosystem, protecting the confidentiality and privacy of survey data is increasingly important.  It requires more than legal ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • NATIONAL ADDICTION AND HIV ... NATIONAL ADDICTION AND HIV DATA ARCHIVE PROGRAM: DEVELOPING AN APPROACH FOR REUSE OF SENSITIVE AND CONFIDENTIAL DATA
    Etz, Kathy; Kimmel, Heather L; Pienta, Amy The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Sharing data produced through health research projects has been increasingly recognized as a way to advance science more rapidly by facilitating discovery and increasing rigor and reproducibility. ...
Full text
Available for: NUK, UL, UM, UPUK
5.
  • Harnessing the Cloud for Se... Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
    Wang, Cong; Ren, Kui; Wang, Jia ... IEEE transactions on parallel and distributed systems, 06/2013, Volume: 24, Issue: 6
    Journal Article
    Peer reviewed

    Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved ...
Full text
Available for: IJS, NUK, UL
6.
Full text
Available for: NUK, UL, UM, UPUK

PDF
7.
  • Secure Optimization Computa... Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
    Wang, Cong; Ren, Kui; Wang, Jia IEEE transactions on computers, 2016-Jan.-1, 2016-1-1, Volume: 65, Issue: 1
    Journal Article
    Peer reviewed

    Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming ...
Full text
Available for: IJS, NUK, UL
8.
  • Developing access to confid... Developing access to confidential data in France: results and new challenges
    SILBERMAN, Roxane The journal of privacy and confidentiality, 09/2021, Volume: 11, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Over the past twenty years, in various countries, secure access to data for the members of the research community was eased in a significant manner. Such data involve microdata and granular data from ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
9.
  • Inkless Writing and Self-Er... Inkless Writing and Self-Erasing Security Feature of (Z)-1,2-Diarylacrylonitrile-Based Materials: A Confidential Data Communication
    Panda, Tamas; Maiti, Dilip K; Panda, Manas K ACS applied materials & interfaces, 08/2018, Volume: 10, Issue: 34
    Journal Article
    Peer reviewed

    Development of a novel organic luminescent material for inkless writing, and self-erasing application is a remarkable solution to reduce paper waste, recycling cost in the printing industry. These ...
Full text
Available for: IJS, KILJ, NUK, PNG, UL, UM
10.
  • Oceanographic data manageme... Oceanographic data management in Taiwan: An appraisal under the transnational legal ordering perspective
    Tseng, Hui-Yi Katherine; Kao, Shih-Ming Marine policy, September 2023, 2023-09-00, Volume: 155
    Journal Article
    Peer reviewed

    In this article, the oceanographic data management of Taiwan is studied under the analytical framework of transnational legal ordering, whereby the evolution of transnational norm-making in the ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
hits: 84

Load filters