UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 57
1.
  • Enabling Secure and Efficie... Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
    Wang, Cong; Cao, Ning; Ren, Kui ... IEEE transactions on parallel and distributed systems, 08/2012, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed

    Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public ...
Full text
2.
  • Tiered Access to Research D... Tiered Access to Research Data for Secondary Analysis
    Marcotte, John E; Rush, Sarah; Ogden-Schuette, Kelly The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Research data have expanded in their gradation of the risks associated with both re-identification and harm, which has created a need for multiple levels of access controls beyond public and ...
Full text
3.
  • NATIONAL ADDICTION AND HIV ... NATIONAL ADDICTION AND HIV DATA ARCHIVE PROGRAM: DEVELOPING AN APPROACH FOR REUSE OF SENSITIVE AND CONFIDENTIAL DATA
    Etz, Kathy; Kimmel, Heather L; Pienta, Amy The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Sharing data produced through health research projects has been increasingly recognized as a way to advance science more rapidly by facilitating discovery and increasing rigor and reproducibility. ...
Full text
4.
  • Beyond Legal Frameworks and... Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection
    Pienta, Amy; Jang, Joy; Levenstein, Margaret The journal of privacy and confidentiality, 12/2023, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    With a growing demand for data reuse and open data within the scientific ecosystem, protecting the confidentiality and privacy of survey data is increasingly important.  It requires more than legal ...
Full text
5.
  • Harnessing the Cloud for Se... Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
    Wang, Cong; Ren, Kui; Wang, Jia ... IEEE transactions on parallel and distributed systems, 06/2013, Volume: 24, Issue: 6
    Journal Article
    Peer reviewed

    Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved ...
Full text
6.
Full text

PDF
7.
  • Securing Data in Internet o... Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
    Khari, Manju; Garg, Aditya Kumar; Gandomi, Amir H. ... IEEE transactions on systems, man, and cybernetics. Systems, 2020-Jan., 2020-1-00, Volume: 50, Issue: 1
    Journal Article
    Peer reviewed

    Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be ...
Full text
8.
  • Secure Optimization Computa... Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
    Wang, Cong; Ren, Kui; Wang, Jia IEEE transactions on computers, 2016-Jan.-1, 2016-1-1, Volume: 65, Issue: 1
    Journal Article
    Peer reviewed

    Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming ...
Full text
9.
  • Developing access to confid... Developing access to confidential data in France: results and new challenges
    SILBERMAN, Roxane The journal of privacy and confidentiality, 09/2021, Volume: 11, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Over the past twenty years, in various countries, secure access to data for the members of the research community was eased in a significant manner. Such data involve microdata and granular data from ...
Full text

PDF
10.
  • Oceanographic data manageme... Oceanographic data management in Taiwan: An appraisal under the transnational legal ordering perspective
    Tseng, Hui-Yi Katherine; Kao, Shih-Ming Marine policy, September 2023, 2023-09-00, Volume: 155
    Journal Article
    Peer reviewed

    In this article, the oceanographic data management of Taiwan is studied under the analytical framework of transnational legal ordering, whereby the evolution of transnational norm-making in the ...
Full text
1 2 3 4 5
hits: 57

Load filters