The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RSA algorithm is one of the most popular and secure public key cryptographic algorithms. To guarantee data security in cloud computing, RSA algorithm has been widely used in cloud. The security of RSA algorithm lies in the difficulty of factoring large integers efficiently. The General Number Field Sieve (GNFS) algorithm is the most efficient algorithm for factoring integers greater than 110 digits...
Data veracity ensures that the data used are trusted, authentic and protected from unauthorized access and modification. In order to implement the veracity of big data, specific trust models and approaches must be designed and developed. In this paper, a category based context aware and recommendation incentive based reputation mechanism (CCRM) is proposed to defend against the internal attacks to...
Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all...
Software as a Service (SaaS) provides a useful and convenient way for cloud users to enjoy cloud service, but security problems have caused great influence on the development and popularization of SaaS. As a commercial model, SaaS involves different roles of participants who could be dishonest and malicious. This paper presents a security protocol to address several security issues in SaaS and protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.