Literatura académica sobre el tema "Data possessing"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Data possessing".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Data possessing"

1

Shimizu, Ryotaro, Haruka Yamashita, Masao Ueda, Ranna Tanaka, Tetsuya Tachibana y Masayuki Goto. "Latent Variable Models for Integrated Analysis of Credit and Point Usage History Data on Rewards Credit Card System". International Business Research 13, n.º 3 (21 de febrero de 2020): 106. http://dx.doi.org/10.5539/ibr.v13n3p106.

Texto completo
Resumen
Recently, credit cards with point rewards functions (rewards credit cards) are widely used. Credit card companies can collect the users’ usage log data of various stores in multiple industries. The purposes of possessing a credit card varies depending on each user such as to use only the credit function, to use both the credit and point rewards functions, etc. Moreover, credit cards can be used in various situations in users’ lives, and the purchase history of each user is diverse. Focusing on the diversity of both card possessing purposes and purchasing behavior for each user, we propose two latent class models representing these diversities in this research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Nakazono-Nagaoka, Eiko, Takashi Fujikawa, Ayumi Shikata, Chakrit Tachaapaikoon, Rattiya Waeonukul, Patthra Pason, Khanok Ratanakhanokchai y Akihiko Kosugi. "Draft genome sequence data of Clostridium thermocellum PAL5 possessing high cellulose-degradation ability". Data in Brief 25 (agosto de 2019): 104274. http://dx.doi.org/10.1016/j.dib.2019.104274.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Borooah, Vani. "Measuring Economic Inequality: Deprivation, Economising and Possessing". Social Policy and Society 6, n.º 1 (enero de 2007): 99–109. http://dx.doi.org/10.1017/s1474746406003368.

Texto completo
Resumen
One way of measuring the deprivation or poverty of persons is to use money-based measures: a person is regarded as ‘poor’ if his/her income (or expenditure) falls below a poverty line value. Such an approach – usually termed poverty analysis – has spawned a large literature embodying several sophisticated measures of poverty. The downside to this is that low income or expenditure may not be very good indicators of deprivation. Another way, usually termed ‘deprivation analysis’, is to define an index whose value, for each person, is the number (or proportion) of items from a prescribed list that he/she possesses: persons are then regarded as ‘deprived’ if their index value is below some threshold. This offers an alternative method of identifying deprived persons. The disadvantage of deprivation analysis is that it measures deprivation exclusively in terms of the proportion of deprived persons within the total number of persons. The purpose of this paper is to bridge the gap between poverty and deprivation analysis by constructing a wider set of measures of economic inequality and by showing, with data for Northern Ireland, how they might be applied. The result is an analysis sensitive to intra-population heterogeneity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mbise, Amana Talala. "Birth Certificates, Birth Registration and the Denial of Human Rights: Evidence from Tanzania National Panel Data 2010/11". International Journal of Children’s Rights 28, n.º 2 (17 de junio de 2020): 243–57. http://dx.doi.org/10.1163/15718182-02802002.

Texto completo
Resumen
In many countries, a birth certificate is necessary to attend school, receive health care, inherit property, open a bank account, gain access to credit, obtain other forms of identification, vote, and receive a death certificate (Hunter and Brill, 2016). A birth certificate is proof of identity, citizenship and serves as a gateway to the realisation of other rights for children. It also serves as evidence that a child has been registered. Using evidence from the Tanzania National Panel Data 2010/11, I show that birth registration predicts lower odds for possessing a birth certificate for children in Tanzania. Instead, the education of the mother and the ability of households to pay for their own malaria bed nets, serve as the strongest predictors for possessing birth certificates in Tanzania. The article concludes with recommendations for improving birth registration and certification in Tanzania.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

McGlynn, Clare y Hannah Bows. "Possessing Extreme Pornography: Policing, Prosecutions and the Need for Reform". Journal of Criminal Law 83, n.º 6 (25 de septiembre de 2019): 473–88. http://dx.doi.org/10.1177/0022018319877783.

Texto completo
Resumen
The law criminalising the possession of extreme pornography, first enacted in 2008 and amended to include rape pornography in 2015, continues to generate considerable controversy and calls for reform. In order to inform these ongoing discussions, we undertook a study to find out information about who is being charged with extreme pornography offences and their characteristics in terms of gender, age and ethnicity, as well as data on the specific type of pornography forming the subject-matter of those charges. Utilising freedom of information requests, our study provides valuable new information to help inform debates over the policing of extreme pornography across England and Wales. Overall, we found that the vast majority of those charged were white men across all age groups; that bestiality images formed the most common basis for charging and that, in respect of the data provided, the majority of charges were brought together with other sexual offences.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Villa-Verde, Leandro, Henrique Lazzarotto y Sergio M. Q. Lima. "A new glanapterygine catfish of the genus Listrura (Siluriformes: Trichomycteridae) from southeastern Brazil, corroborated by morphological and molecular data". Neotropical Ichthyology 10, n.º 3 (septiembre de 2012): 527–38. http://dx.doi.org/10.1590/s1679-62252012000300005.

Texto completo
Resumen
Listrura costai, new species, is described from small streams in a swampy coastal plain in the rio Jurumirim basin, Angra dos Reis Municipality, Rio de Janeiro State, southeastern Brazil. The new species is morphologically very similar to L. nematopteryx and L. picinguabae, all possessing only one long pectoral-fin ray. It differs from its congeners by possessing an autapomorphic character: first hypobranchial with an anterior process (vs. process absent). Other features such as coloration, numbers of opercular and interopercular odontodes, number of anal-fin rays, head length, and shape of some bone structures help to distinguish the new species from L. nematopteryx and L. picinguabae. Molecular analyses using partial sequences of the mitochondrial DNA genes cytochrome oxidase c subunit 1 and cytochrome b from the new species and morphologically similar species are provided. The results about both molecular markers corroborate the validity of the new species by significant genetic distance values between it and congeneric species, and by its phylogenetic position in the hypotheses performed by maximum-parsimony method.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Jenkins, Kelsey M. y Jack O. Shaw. "Bite force data suggests relationship between acrodont tooth implantation and strong bite force". PeerJ 8 (30 de junio de 2020): e9468. http://dx.doi.org/10.7717/peerj.9468.

Texto completo
Resumen
Extant and extinct reptiles exhibit numerous combinations of tooth implantation and attachment. Tooth implantation ranges from those possessing roots and lying within a socket (thecodonty), to teeth lying against the lingual wall of the jawbone (pleurodonty), to teeth without roots or sockets that are attached to the apex of the marginal jawbones (acrodonty). Attachment may be ligamentous (gomphosis) or via fusion (ankylosis). Generally speaking, adaptative reasonings are proposed as an underlying driver for evolutionary changes in some forms of tooth implantation and attachment. However, a substantiated adaptive hypothesis is lacking for the state of acrodont ankylosis that is seen in several lineages of Lepidosauria, a clade that is plesiomorphically pleurodont. The convergent evolution of acrodont ankylosis in several clades of lepidosaurs suggests a selective pressure shaped the evolution of the trait. We hypothesize that acrodont ankylosis as seen in Acrodonta and Sphenodon punctatus, is an adaptation either resulting from or allowing for a stronger bite force. We analyzed bite force data gathered from the literature to show that those taxa possessing acrodont dentition possess a stronger bite force on average than those taxa with pleurodont dentition. Dietary specialists with pleurodont dentition may also possess relatively high bite forces, though body size may also play a role in their ability to bite hard. Furthermore, our results have implications for the evolution of acrodont ankylosis and potential behaviors related to strong bite force that influenced the evolution of acrodonty within Acrodonta and Rhynchocephalia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hrouzek, Ján, Ján Krupčík y Ivan Skačáni. "Correlation Between GC Retention Data and Relative Molecular Weight of N,N-Bis(2,2,2-trifluoroethyl)dithiocarbamates of Some Divalent Metals". Collection of Czechoslovak Chemical Communications 61, n.º 11 (1996): 1609–14. http://dx.doi.org/10.1135/cccc19961609.

Texto completo
Resumen
The correlation of gas-chromatographic retention data (retention times and linear retention indices) and relative molecular weight was examined for N,N-bis(2,2,2-trifluoroethyl)dithiocarbamate chelates of some divalent metals. Regression analysis of data obtained by capillary GC on a non-polar column heated by applying a dual-ramp temperature programme gave linear dependences possessing reasonable correlation coefficients.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Zhang, Zhi Zhou, Ling Ling Zhang, Long Hua She y Zhi Qiang Long. "Fuzzy Integrality Design for Maglev Networked Control System with Sensor Data Dropouts". Applied Mechanics and Materials 44-47 (diciembre de 2010): 1437–41. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.1437.

Texto completo
Resumen
Considering the parameter’s uncertainty of Maglev networked control system, a fuzzy fault-tolerant control method possessing integrity based on T-S model was proposed with sensor data dropouts. When the sensor data of maglev networked system drops out, the state variable sampled at last control period is adopted by the controller. By setting different fault models of sensors and actuators, the fuzzy discrete close-loop model of maglev system was built with system parameter’s uncertainty. A passive integrality control method against sensor and actuator failures was designed with Linear Matrix Inequation (LMI). Simulation results well proved the effectiveness of the algorithm.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Baramee, Sirilak, Ayaka Uke, Chakrit Tachaapaikoon, Rattiya Waeonukul, Patthra Pason, Khanok Ratanakhanokchai y Akihiko Kosugi. "Draft genome sequence data of Paenbacillus curdlanolyticus B-6 possessing a unique xylanolytic-cellulolytic multienzyme system". Data in Brief 32 (octubre de 2020): 106213. http://dx.doi.org/10.1016/j.dib.2020.106213.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Data possessing"

1

Mohan, Akshaya. "Provable Data Possession Using Sigma Protocols". Thesis, North Dakota State University, 2013. https://hdl.handle.net/10365/27042.

Texto completo
Resumen
A Provable Data Possession (PDP) scheme allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving the entire file. In this thesis study, a new PDP scheme is built using the concept of sigma protocols. The client pre-processes a file and stores it on the server. At a later time, the client issues a challenge to the server requesting it to compute a Proof of Possession. The client verifies the response using its locally stored metadata. The challenge-response protocol that is derived from the sigma protocol, minimizes both computation and communication complexity. Implementation and complexity analysis of the algorithms used in the sigma-PDP scheme was done as a part of this thesis. The main goal of this research was to minimize computation and communication complexity of sigma-PDP scheme as compared to the existing PDP schemes. The main goal of this research was to minimize computation and communication complexity of sigma-PDP scheme as compared to the existing PDP schemes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Riebel-Charity, Krisztina C. "Developing a library for proofs of data possession in Charm". Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34728.

Texto completo
Resumen
Approved for public release; distribution is unlimited
Provable Data Possession (PDP) is a cryptographic tool for auditing big data on a storage server or in the cloud. The goal of PDP is to efficiently verify that the server is storing the data. PDP provides probabilistic guarantees that the server is storing the information, and it will be available when needed, without accessing the entire file. In this work, we have developed a PDP module for the Charm cryptographic framework. We wrote an application programmer interface (API) for generic PDP schemes. We implemented the simple MAC-PDP scheme with efficient subroutines for sub-linear sampling. We hope that this work will encourage further study in the rapid prototyping and evaluation of new PDP schemes in the Charm framework.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.

Texto completo
Resumen
Provable Data Possession (PDP) schemes provide users with the ability to efficiently audit and verify the integrity of data stored with potentially unreliable third-parties, such as cloud storage service providers. While dozens of PDP schemes have been developed, no PDP schemes have been practically implemented with an existing cloud service. This work attempts to provide a starting point for the integration of PDP schemes with cloud storage service providers by providing a cost analysis of PDP schemes. This cost analysis is performed by implementing and analyzing five PDP schemes representative of the dozens of various PDP approaches. This paper provides analysis of the overhead and performance of each of these schemes to generate a comparable cost for each scheme using real-world cloud pricing models. Results show that the total cost of each scheme is comparable for smaller file sizes, but for larger files this cost can vary across schemes by an order of magnitude. Ultimately, the difference in cost between the simple MAC-based PDP scheme and the most "efficient" PDP scheme is negligible. While the MAC-PDP scheme may not be the most efficient, no other scheme improving upon it's complexity can be implemented without the use of additional services or APIs leading to the conclusion that the simplest, storage only PDP scheme is the most practical to implement. Furthermore, the findings in this paper suggest that, in general, PDP schemes optimize on an inaccurate cost model and that future schemes should consider the existing economic realities of cloud services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Gulotta, Rebecca. "Digital Systems and the Experience of Legacy: Supporting Meaningful Interactions with Multigenerational Data". Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/778.

Texto completo
Resumen
People generate vast quantities of digital information as a product of their interactions with digital systems and with other people. As this information grows in scale and becomes increasingly distributed through different accounts, identities, and services, researchers have studied how best to develop tools to help people manage and derive meaning from it. Looking forward, these issues acquire new complexity when considered in the context of the information that is generated across one’s life or across generations. The long-term lens of a multigenerational timeframe elicits new questions about how people can engage with these heterogeneous collections of information and how future generations will manage and make sense of the information left behind by their ancestors. My prior work has examined how people perceive the role that systems will play in the long-term availability, management, and interpretation of digital information. This work demonstrates that while people certainly ascribe meaning to aspects of their digital information and believe that there is value held in their largely uncurated digital materials, it is not clear how or if that digital information will be transmitted, interpreted, or maintained by future generations. Furthermore, this work illustrates that there is a tension between the use of digital systems as ways of archiving content and sharing aspects of one’s life, and an uncertainty about the long term availability of the information shared through those services. Finally, this work illustrates the ways in which existing systems do not meet the needs of current users who are developing archives of their own digital information nor of future users who might try and derive meaning from information left behind by other people. Building on that earlier work, my dissertation work investigates how we can develop systems that foster engagement with lifetimes or generations of digital information in ways that are sensitive to how people define and communicate their identity and how they reflect on their life and experiences. For this work, I built a website that uses people’s Facebook data to ask them to reflect on the ways their life has changed over time. Participants’ experiences using this website illustrate the types of information that are and are not captured by digital systems. In addition, this work highlights the ways in which people engage with memories, artifacts, and experiences of people who have passed away and considers how digital systems and information can support those practices. I also interviewed participants about their experiences researching their family history, the ways in which they remember people who’ve passed away, and unresolved questions they have about the past. The findings from this aspect of the work contribute a better understanding of how digital systems, and the digital information people create over the course of their lives, intersect with the processes of death, dying, and remembrance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Noman, Ali. "Addressing the Data Location Assurance Problem of Cloud Storage Environments". Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37375.

Texto completo
Resumen
In a cloud storage environment, providing geo-location assurance of data to a cloud user is very challenging as the cloud storage provider physically controls the data and it would be challenging for the user to detect if the data is stored in different datacenters/storage servers other than the one where it is supposed to be. We name this problem as the “Data Location Assurance Problem” of a Cloud Storage Environment. Aside from the privacy and security concerns, the lack of geo-location assurance of cloud data involved in the cloud storage has been identified as one of the main reasons why organizations that deal with sensitive data (e.g., financial data, health-related data, and data related to Personally Identifiable Infor-mation, PII) cannot adopt a cloud storage solution even if they might wish to. It might seem that cryptographic techniques such as Proof of Data Possession (PDP) can be a solution for this problem; however, we show that those cryptographic techniques alone cannot solve that. In this thesis, we address the data location assurance (DLA) problem of the cloud storage environment which includes but is not limited to investigating the necessity for a good data location assurance solution as well as challenges involved in providing this kind of solution; we then come up with efficient solutions for the DLA problem. Note that, for the totally dis-honest cloud storage server attack model, it may be impossible to offer a solution for the DLA problem. So the main objective of this thesis is to come up with solutions for the DLA problem for different system and attack models (from less adversarial system and attack models to more adversarial ones) available in existing cloud storage environments so that it can meet the need for cloud storage applications that exist today.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.

Texto completo
Resumen
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, considérablement due à la perte de maîtrise et de gouvernance. Cette dissertation vise à surmonter ce dilemme, tout en tenant compte de deux préoccupations de sécurité des données, à savoir la confidentialité des données et l’intégrité des données. En premier lieu, nous nous concentrons sur la confidentialité des données, un enjeu assez considérable étant donné le partage de données flexible au sein d’un groupe dynamique d’utilisateurs. Cet enjeu exige, par conséquence, un partage efficace des clés entre les membres du groupe. Pour répondre à cette préoccupation, nous avons, d’une part, proposé une nouvelle méthode reposant sur l’utilisation de la cryptographie basée sur l’identité (IBC), où chaque client agit comme une entité génératrice de clés privées. Ainsi, il génère ses propres éléments publics et s’en sert pour le calcul de sa clé privée correspondante. Grâce aux propriétés d’IBC, cette contribution a démontré sa résistance face aux accès non autorisés aux données au cours du processus de partage, tout en tenant compte de deux modèles de sécurité, à savoir un serveur de stockage honnête mais curieux et un utilisateur malveillant. D’autre part, nous définissons CloudaSec, une solution à base de clé publique, qui propose la séparation de la gestion des clés et les techniques de chiffrement, sur deux couches. En effet, CloudaSec permet un déploiement flexible d’un scénario de partage de données ainsi que des garanties de sécurité solides pour les données externalisées sur les serveurs du cloud. Les résultats expérimentaux, sous OpenStack Swift, ont prouvé l’efficacité de CloudaSec, en tenant compte de l’impact des opérations cryptographiques sur le terminal du client. En deuxième lieu, nous abordons la problématique de la preuve de possession de données (PDP). En fait, le client du cloud doit avoir un moyen efficace lui permettant d’effectuer des vérifications périodiques d’intégrité à distance, sans garder les données localement. La preuve de possession se base sur trois aspects : le niveau de sécurité, la vérification publique, et les performances. Cet enjeu est amplifié par des contraintes de stockage et de calcul du terminal client et de la taille des données externalisées. Afin de satisfaire à cette exigence de sécurité, nous définissons d’abord un nouveau protocole PDP, sans apport de connaissance, qui fournit des garanties déterministes de vérification d’intégrité, en s’appuyant sur l’unicité de la division euclidienne. Ces garanties sont considérées comme intéressantes par rapport à plusieurs schémas proposés, présentant des approches probabilistes. Ensuite, nous proposons SHoPS, un protocole de preuve de possession de données capable de traiter les trois relations d’ensembles homomorphiques. SHoPS permet ainsi au client non seulement d’obtenir une preuve de la possession du serveur distant, mais aussi de vérifier que le fichier, en question, est bien réparti sur plusieurs périphériques de stockage permettant d’atteindre un certain niveau de la tolérance aux pannes. En effet, nous présentons l’ensemble des propriétés homomorphiques, qui étend la malléabilité du procédé aux propriétés d’union, intersection et inclusion
Recent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Chuang, Che-Wei y 莊哲偉. "A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44320104491391635899.

Texto completo
Resumen
碩士
國立臺灣科技大學
資訊管理系
102
An increasing number of cloud services, such as Amazon, Yahoo!, Google Drive, Dropbox, and iCloud, provides efficient and scalable data storage services at a considerably lower marginal cost than providers employing traditional ap-proaches. Uses of this type of storage include online data backup, photo sharing, and applications related to email and crucial documents. However, data stored in a cloud are vulnerable to loss, corruption through hardware and software fail-ures, and human errors. Thus, verifying the authenticity of data has emerged as a critical concern regarding data storage on cloud servers. To address the vulnerabilities of cloud-stored data, many approaches have been proposed. However, most of these approaches focus only on the data of indi-vidual users. This study addressed the data of groups and focused on categories that are generally considered crucial: testaments, vital contracts between organizations, and contracts between countries. Thus, to improve the security of cloud-stored group data, a verification protocol for group users based on the short signature protocol developed by Zhang et al. and the authenticated group key agreement protocol developed by Tsai is proposed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tasi, Meng-Ting y 蔡孟廷. "Multiple Replica Provable Data Possession Mechanisms in Cloud Computing". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/38442621516959654359.

Texto completo
Resumen
碩士
南台科技大學
資訊管理系
100
Recently, the service of data storage in cloud becomes mature. The new model of data storage, however, brings many new information security problems and challenges. For examples, the providers of cloud storage service may base on their own benefits to hide the faults during storing data and do not inform data owners. They may deliberately remove less access data in order to save storage space and cost. They also probably cheat data owners that multiple replicas of the data have been stored, in fact, only one replica is stored. Therefore, the main objective of our research is how to verify the integrity and availability of stored data in cloud computing environment. The thesis first focuses on the security of the static data stored in the cloud storage devices and tries to design secure and efficient provable data possession protocols. It will not restrict the number of verifying data possession, and offer verification to multiple servers at the same time. Furthermore, we consider the dynamic data processing, and also design the dynamic provable data possession protocols in the cloud computing environment. It can achieve the destination of extending the applied environment of the provable data possession protocols.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Chen, Fu-Sheng y 陳福聖. "Enabling Public Verification of Provable Data Possession with Lightweight Computations". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/28843664970111391619.

Texto completo
Resumen
碩士
國立臺灣大學
電機工程學研究所
100
Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chou, Fan-Gang y 周凡剛. "Multiple-Committed Proof of Data Possession Among Multiple Co-Workers". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/19321311126653772272.

Texto completo
Resumen
碩士
國立臺灣大學
電機工程學研究所
100
Our proposed scheme is a scheme focused on Proof of Data Possession (PDP) among multiple co-workers. We will have a master who originally owns the file and a group of co-workers. Every granted co-worker can generate valid signatures and modify the Merkle Hash Tree on files he writes or modifies. We will also have a server or trusted third party to play the role of bridge between the co-workers and the master, storing the public key and identity list of owners and co-workers. During verification phase, we should first check the signer of the tokens then retrieve the proper public keys to the verifier. We proposed a protocol that can change normal PDP or POR into a shared PDP or a shared POR among many coworkers. The advantage of our scheme is that we can do some access control on the co-workers and keep track of any co-workers’ behavior. If someone cheats, we can undeniably know who the cheater is by examining the fragment of the modified file. We also make some improvements on the BLS signature based PDP making it faster but still secure. Duo to our implementations and experiments, we can truly say that the additional cost of our scheme is acceptable.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Data possessing"

1

Kolvankar, V. G. Hardware beam forming system for Gauribidanur seismic array. Mumbai: Bhabha Atomic Research Centre, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Khan, Md Moslem Uddin. Case laws of adverse possession and declaratory suits: Upto date civil reference. Dhaka: Bangladesh Law Book Company, 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Khan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Khan, Md Moslem Uddin. Biruddha dakhalī svatva o subidhā adhikāra āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others, up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Khan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Khan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Khan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

The red thread: Healing possession at a Muslim shrine in North India. Delhi: Aakar Books, 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

United States. Congress. House. Committee on Natural Resources. Subcommittee on Insular Affairs., ed. Census data: Special issues related to U.S. territories : joint hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform and the Subcommittee on Insular Affairs of the Committee on Natural Resources, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Review of federal expenditure trends: United States insular areas in the Pacific : Consolidated Federal Funds: FY 1997-2010, Federal Assistance Award Data System: FY 2000-2010. Hagåtña, Guam: Department of Labor, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Data possessing"

1

Tang, Yujin, Kei Yonekawa, Mori Kurokawa, Shinya Wada y Kiyohito Yoshihara. "Binary Classification of Sequences Possessing Unilateral Common Factor with AMS and APR". En Advances in Knowledge Discovery and Data Mining, 322–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93040-4_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Link, Daniel. "Individual Ball Possession". En Data Analytics in Professional Soccer, 9–28. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21177-6_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Krzywiecki, Lukasz, Krzysztof Majcher y Wojciech Macyna. "Efficient Probabilistic Methods for Proof of Possession in Clouds". En Data Mining and Big Data, 364–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40973-3_36.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Zhou, Fucai, Su Peng, Jian Xu y Zifeng Xu. "Identity-Based Batch Provable Data Possession". En Provable Security, 112–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Feng, Chao, Honghong Wang, Wenbo Wan, Qinghua Li y Fangzhou Xu. "Robust/Recover Provable Data Possession Protocol". En Security with Intelligent Computing and Big-data Services, 574–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_46.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Kadvani, Smit, Aditya Patel, Mansi Tilala, Priteshkumar Prajapati y Parth Shah. "Provable Data Possession Using Identity-Based Encryption". En Information and Communication Technology for Intelligent Systems, 87–94. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1742-2_9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Tian, Jun-Feng, Rui-Fang Guo y Xuan Jing. "A Non-repudiable Dynamic Provable Data Possession". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 723–30. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21373-2_61.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Yu, Yong, Yafang Zhang, Yi Mu, Willy Susilo y Hongyu Liu. "Provably Secure Identity Based Provable Data Possession". En Provable Security, 310–25. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_17.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Shen, Shiuan-Tzuo y Wen-Guey Tzeng. "Delegable Provable Data Possession for Remote Data in the Clouds". En Information and Communications Security, 93–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Lin, Changlu, Fucai Luo, Huaxiong Wang y Yan Zhu. "A Provable Data Possession Scheme with Data Hierarchy in Cloud". En Information Security and Cryptology, 301–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38898-4_18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Data possessing"

1

Guihua Liu, Jinzhi Zhou y Jing Wu. "The design of FPGA possessing UCL in data broadcasting". En 2003 5th International Conference on ASIC Proceedings (IEEE Cat No 03TH8690) ICASIC-03. IEEE, 2003. http://dx.doi.org/10.1109/icasic.2003.1277372.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Noël, J. P., L. Renson y G. Kerschen. "Experimental Identification of the Complex Dynamics of a Strongly Nonlinear Spacecraft Structure". En ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12909.

Texto completo
Resumen
The present paper addresses the identification of a real-life spacecraft structure possessing an impact-type nonlinear component. The complete identification procedure, i.e. from nonlinearity detection to parameter estimation, is carried out using experimental data collected during a typical spacecraft qualification test campaign. The complementary use of several techniques reveals particularly interesting and complex phenomena such as nonlinear jumps, nonlinear modal interactions, internal force relaxation and chattering during impacts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Do, Quan, Kris Robinson y Son Tran. "Big Data Analysis: Why Not an Asthma APP?" En InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2216.

Texto completo
Resumen
Asthma and Chronic Obstructive Pulmonary Disease (COPD) is among the highest health diagnosis and therefore an economic drain, which puts substantial pressure on a huge number of patients, communities, and health systems. These chronic conditions are presently incurable but their symptoms can be controlled through quality health care, appropriate medications, and good self-management skills. Many asthma APPs have been developed to support asthma patients’ self-management of the disease. Asthma APPs are still in the infancy stage of development. Literature review indicates satisfaction to be equivocal. Moreover, available APPs have many unresolved issues, such as the following: (1) No APP provides comprehensive asthma information while at the same time possessing the characteristics of an efficient tool for self-management of the disease; (2) No APP has the ability to integrate data from disparate formats; (3) Not many APPs provide for two way communication between patients and Health Care Providers (HCPs) and support the providers decision making process; (4) No APP targets older adults. Different sources of data often imply data stored in inherently different formats. The integration of such data, culled from different databases requires use of Big Data (BD) techniques. The proposed asthma mobile APP aims to promote elderly asthma patients’ positive adjustment to this chronic disease by being an effective tool for patients to control their asthma triggers and support asthma self-management. Adjustment is a dynamic process and varies by individual. For that reason, a personalized asthma APP is necessary to control this chronic disease. The proposed asthma APP will allow patients to input their own asthma self-management data so the APP can identify patient personal triggers and will predict an asthma attack accordingly. Considering a patient’s individual determinants and uniqueness is required to push the patient’s positive adjustment to asthma since these elements affect the ability of individual to adapt to the illness. The paper reports our effort to establish the desirable characteristics for the next generation asthma APP and for a population segment not presently well served.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Chen, Liuqing, Feng Shi, Ji Han y Peter R. N. Childs. "A Network-Based Computational Model for Creative Knowledge Discovery Bridging Human-Computer Interaction and Data Mining". En ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67228.

Texto completo
Resumen
As a branch of computational creativity, Creative Knowledge Discovery (CKD) aims to search for valuable, previously unknown, or ignored, relationships between concepts, and create new patterns by taking advantage of existing patterns or by analogy to patterns in other domains. Data mining has been widely used in CKD research. However, most proposed mining algorithms lack a theoretical basis for computational creativity due to their origins in traditional knowledge discovery in databases (KDD), which stymies novelty. In addition, integration of human-computer interaction (HCI) is often overlooked for assisting discovery of creative knowledge despite the human end user possessing problem solving intelligence. To address these issues, a network-based computational model bridging human-computer interaction and data mining is proposed arising from an initial investigation on the theoretical basis of computational creativity. A corresponding creativity evaluation methodology, Multi-dimensional In-depth Long-term Case studies (MILCs) is also introduced. In order to evaluate the proposed model, a web tool called B-Link has been developed. Longitudinal interviews and a questionnaire survey have been conducted by applying the MILCs evaluation method. The success of finding novel items and obtaining inspiration in interviews as well as the positive survey rating results of all five creativity metrics have suggested that B-Link is able to guide thinking processes and aid creative knowledge discovery effectively, which demonstrates the capability of the proposed network-based computational creativity model integrating human-computer interaction and data mining.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Erway, Chris, Alptekin Küpçü, Charalampos Papamanthou y Roberto Tamassia. "Dynamic provable data possession". En the 16th ACM conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1653662.1653688.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Rickli, Jeremy y Jaime Camelio. "Monitoring and Diagnosis of Assembly Fixture Faults Using Modified Multivariate Control Charts and Surface Scanning Content". En ASME 2007 International Manufacturing Science and Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/msec2007-31075.

Texto completo
Resumen
Recent advances in process monitoring technology have introduced an influx of exceptionally large data sets containing information on manufacturing process health. Recorded data sets are comprised of numerous parameters for which multivariate statistical process control (MSPC) methodologies are required. Current multivariate control charts are ideal for monitoring data sets with a minimal amount of parameters, however, new monitoring devices such as surface scanning cameras increase the number of parameters by two orders of magnitude in some cases. This paper proposes a modified form of the original multivariate Hotelling T2 chart possessing the capability to monitor manufacturing processes containing a large number of parameters and a fault diagnosis procedure incorporating least squares analysis in conjunction with univariate control charts. A case study considering surface scanning of compliant sheet metal components and comparisons to processes utilizing Optical CMM’s is presented as verification of the proposed assembly fixture fault diagnosis methodology and modified Hotelling T2 multivariate control chart.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

No, Hidekazu, Michel Call y Akira T. Tokuhiro. "Comparison of Near Wake-Flow Structure Behind a Solid Cap With an Attached Bubble and a Solid Counterpart". En ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45565.

Texto completo
Resumen
An experimental study was conducted on the flow structure in the near-wake of a hollow cap with an air bubble attached underneath and a solid object possessing a bubble-like shape. The objective of the study was to elucidate distinguishing wake flow characteristics of the capped bubble relative to the solid. The experiment was performed in a square channel, 80×80mm2 in cross section. The bubble and solid were separately suspended in downward flow of purified water. Both the capped bubble and the solid were ellipsoidal in shape (the cap was shaped to represent the front of an ellipsoidal bubble) and had an approximate volume of 0.8ml. The Reynolds number for the flow, based on the objects’ equivalent diameter and average downward flow velocity (U = 25cm/s), was Re ≅ 2800. Velocity measurements were taken using Particle Image Velocimetry. The obtained velocity data were analyzed to deduce vorticity, turbulent kinetic energy, production, and Reynolds stress. Graphic and numerical comparisons between the two cases were made. The results to date are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Chahine, Georges L. y Kenneth M. Kalumuck. "Development of a Near Real-Time Instrument for Nuclei Measurement: The ABS Acoustic Bubble Spectrometer®". En ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45310.

Texto completo
Resumen
The ABS Acoustic Bubble Spectrometer® (ABS) is an acoustics based device that measures bubble size distributions and void fractions in liquids using the properties of acoustic wave propagation through a two-phase medium. The ABS is PC-based and uses software that controls signal generation, detection and signal processing through data boards and two hydrophones. The data is processed and analyzed utilizing inverse problem solution algorithms to obtain the bubble size distribution. All physical, experimental, and analytical parameters are input by the user via a series of dialog boxes. The results are displayed graphically by the interface in real time and can also be stored or printed. In this paper we describe the method and present validation experiments that compare bubble distributions and void fraction results of ABS measurements with optical measurements in the laboratory. The two methods give very close results with the ABS possessing the significant advantage of enabling near real-time measurements with the potential to become an on-line measuring device.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Chen, Bo y Reza Curtmola. "Robust Dynamic Provable Data Possession". En 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.57.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Mentes, Ayhan y Ismail H. Helvacioglu. "Review of Fuzzy Set Theory Applications in Safety Assessment for Marine and Offshore Industries". En ASME 2011 30th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2011. http://dx.doi.org/10.1115/omae2011-50244.

Texto completo
Resumen
Various safety analysis techniques have been generated in dealing with uncertain information over the past three decades. The safety assessment based on conventional risk methods may not be well suited with most problems possessing high level of contingencies in marine and offshore systems. In other words, the effect of less confidence, unreliable, missing or incomplete data in safety assessment is arduous to apply common safety and risk assessment techniques for maritime industry. Therefore, fuzzy logic based approaches are probably more appropriate to apply in carrying out safety assessment for maritime systems. This paper presents a survey of applications in fuzzy set theory for safety analysis to marine and offshore industries’ problems. The safety assessment methods are presented in detail by demonstrating their robust and weak points. Subsequently, the main results on the application of fuzzy set theory for safety assessment will be further explained. Finally, recommendations in undertaking developments into the field of maritime safety assessment will be given.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía