The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume...
Searchable symmetric encryption (SSE), known as privacy-preserving keyword search, allows users to perform keyword search on encrypted data. However, until now there are no practical SSE schemes which can support query-document similarity evaluation and provide top-k retrieval on encrypted cloud data. This problem slows down the process of SSE schemes' application in cloud storage service. In this...
Following the wide use of cloud services, the volume of data stored in the data center has experienced a dramatically growth which makes real-time information retrieval much more difficult than before. Furthermore, text information is usually encrypted before being outsourced to data centers in order to protect users' data privacy. Current techniques to search on encrypted data do not perform well...
Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software failures. Dependability assurance is crucial for building sustainable cloud computing services. Although...
The scale of the camera networks in surveillance systems has been largely expanded. However, conventional visualization methods display each camera video on an individual screen. In this way, it is difficult to effectively monitor the regions covered by all of the cameras, especially when tracking a moving target crossing different camera views. In this paper, we propose a novel visualization framework...
To realize ubiquitous computing, data should be able to be accessed from anywhere at anytime. However, for security purpose, we need to encrypt the data so that the attackers cannot obtain any information from the server. Nevertheless, the user should be able to use keywords to search and retrieve required data. To this end, we propose a timestamp based conjunctive keyword searchable public key encryption...
It is impractical to use traditional access control mechanisms to design a digital content access control mechanism for an organization since even a role-based access control mechanism only guarantees that it can be flexibly applied to the determined access policy for various roles in an organization. It cannot allow users to flexibly define various access rights for different digital contents for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.