Literatura académica sobre el tema "Data possessing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Data possessing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Data possessing"
Shimizu, Ryotaro, Haruka Yamashita, Masao Ueda, Ranna Tanaka, Tetsuya Tachibana y Masayuki Goto. "Latent Variable Models for Integrated Analysis of Credit and Point Usage History Data on Rewards Credit Card System". International Business Research 13, n.º 3 (21 de febrero de 2020): 106. http://dx.doi.org/10.5539/ibr.v13n3p106.
Texto completoNakazono-Nagaoka, Eiko, Takashi Fujikawa, Ayumi Shikata, Chakrit Tachaapaikoon, Rattiya Waeonukul, Patthra Pason, Khanok Ratanakhanokchai y Akihiko Kosugi. "Draft genome sequence data of Clostridium thermocellum PAL5 possessing high cellulose-degradation ability". Data in Brief 25 (agosto de 2019): 104274. http://dx.doi.org/10.1016/j.dib.2019.104274.
Texto completoBorooah, Vani. "Measuring Economic Inequality: Deprivation, Economising and Possessing". Social Policy and Society 6, n.º 1 (enero de 2007): 99–109. http://dx.doi.org/10.1017/s1474746406003368.
Texto completoMbise, Amana Talala. "Birth Certificates, Birth Registration and the Denial of Human Rights: Evidence from Tanzania National Panel Data 2010/11". International Journal of Children’s Rights 28, n.º 2 (17 de junio de 2020): 243–57. http://dx.doi.org/10.1163/15718182-02802002.
Texto completoMcGlynn, Clare y Hannah Bows. "Possessing Extreme Pornography: Policing, Prosecutions and the Need for Reform". Journal of Criminal Law 83, n.º 6 (25 de septiembre de 2019): 473–88. http://dx.doi.org/10.1177/0022018319877783.
Texto completoVilla-Verde, Leandro, Henrique Lazzarotto y Sergio M. Q. Lima. "A new glanapterygine catfish of the genus Listrura (Siluriformes: Trichomycteridae) from southeastern Brazil, corroborated by morphological and molecular data". Neotropical Ichthyology 10, n.º 3 (septiembre de 2012): 527–38. http://dx.doi.org/10.1590/s1679-62252012000300005.
Texto completoJenkins, Kelsey M. y Jack O. Shaw. "Bite force data suggests relationship between acrodont tooth implantation and strong bite force". PeerJ 8 (30 de junio de 2020): e9468. http://dx.doi.org/10.7717/peerj.9468.
Texto completoHrouzek, Ján, Ján Krupčík y Ivan Skačáni. "Correlation Between GC Retention Data and Relative Molecular Weight of N,N-Bis(2,2,2-trifluoroethyl)dithiocarbamates of Some Divalent Metals". Collection of Czechoslovak Chemical Communications 61, n.º 11 (1996): 1609–14. http://dx.doi.org/10.1135/cccc19961609.
Texto completoZhang, Zhi Zhou, Ling Ling Zhang, Long Hua She y Zhi Qiang Long. "Fuzzy Integrality Design for Maglev Networked Control System with Sensor Data Dropouts". Applied Mechanics and Materials 44-47 (diciembre de 2010): 1437–41. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.1437.
Texto completoBaramee, Sirilak, Ayaka Uke, Chakrit Tachaapaikoon, Rattiya Waeonukul, Patthra Pason, Khanok Ratanakhanokchai y Akihiko Kosugi. "Draft genome sequence data of Paenbacillus curdlanolyticus B-6 possessing a unique xylanolytic-cellulolytic multienzyme system". Data in Brief 32 (octubre de 2020): 106213. http://dx.doi.org/10.1016/j.dib.2020.106213.
Texto completoTesis sobre el tema "Data possessing"
Mohan, Akshaya. "Provable Data Possession Using Sigma Protocols". Thesis, North Dakota State University, 2013. https://hdl.handle.net/10365/27042.
Texto completoRiebel-Charity, Krisztina C. "Developing a library for proofs of data possession in Charm". Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34728.
Texto completoProvable Data Possession (PDP) is a cryptographic tool for auditing big data on a storage server or in the cloud. The goal of PDP is to efficiently verify that the server is storing the data. PDP provides probabilistic guarantees that the server is storing the information, and it will be available when needed, without accessing the entire file. In this work, we have developed a PDP module for the Charm cryptographic framework. We wrote an application programmer interface (API) for generic PDP schemes. We implemented the simple MAC-PDP scheme with efficient subroutines for sub-linear sampling. We hope that this work will encourage further study in the rapid prototyping and evaluation of new PDP schemes in the Charm framework.
Bartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.
Texto completoGulotta, Rebecca. "Digital Systems and the Experience of Legacy: Supporting Meaningful Interactions with Multigenerational Data". Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/778.
Texto completoNoman, Ali. "Addressing the Data Location Assurance Problem of Cloud Storage Environments". Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37375.
Texto completoKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Texto completoRecent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Chuang, Che-Wei y 莊哲偉. "A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44320104491391635899.
Texto completo國立臺灣科技大學
資訊管理系
102
An increasing number of cloud services, such as Amazon, Yahoo!, Google Drive, Dropbox, and iCloud, provides efficient and scalable data storage services at a considerably lower marginal cost than providers employing traditional ap-proaches. Uses of this type of storage include online data backup, photo sharing, and applications related to email and crucial documents. However, data stored in a cloud are vulnerable to loss, corruption through hardware and software fail-ures, and human errors. Thus, verifying the authenticity of data has emerged as a critical concern regarding data storage on cloud servers. To address the vulnerabilities of cloud-stored data, many approaches have been proposed. However, most of these approaches focus only on the data of indi-vidual users. This study addressed the data of groups and focused on categories that are generally considered crucial: testaments, vital contracts between organizations, and contracts between countries. Thus, to improve the security of cloud-stored group data, a verification protocol for group users based on the short signature protocol developed by Zhang et al. and the authenticated group key agreement protocol developed by Tsai is proposed.
Tasi, Meng-Ting y 蔡孟廷. "Multiple Replica Provable Data Possession Mechanisms in Cloud Computing". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/38442621516959654359.
Texto completo南台科技大學
資訊管理系
100
Recently, the service of data storage in cloud becomes mature. The new model of data storage, however, brings many new information security problems and challenges. For examples, the providers of cloud storage service may base on their own benefits to hide the faults during storing data and do not inform data owners. They may deliberately remove less access data in order to save storage space and cost. They also probably cheat data owners that multiple replicas of the data have been stored, in fact, only one replica is stored. Therefore, the main objective of our research is how to verify the integrity and availability of stored data in cloud computing environment. The thesis first focuses on the security of the static data stored in the cloud storage devices and tries to design secure and efficient provable data possession protocols. It will not restrict the number of verifying data possession, and offer verification to multiple servers at the same time. Furthermore, we consider the dynamic data processing, and also design the dynamic provable data possession protocols in the cloud computing environment. It can achieve the destination of extending the applied environment of the provable data possession protocols.
Chen, Fu-Sheng y 陳福聖. "Enabling Public Verification of Provable Data Possession with Lightweight Computations". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/28843664970111391619.
Texto completo國立臺灣大學
電機工程學研究所
100
Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures.
Chou, Fan-Gang y 周凡剛. "Multiple-Committed Proof of Data Possession Among Multiple Co-Workers". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/19321311126653772272.
Texto completo國立臺灣大學
電機工程學研究所
100
Our proposed scheme is a scheme focused on Proof of Data Possession (PDP) among multiple co-workers. We will have a master who originally owns the file and a group of co-workers. Every granted co-worker can generate valid signatures and modify the Merkle Hash Tree on files he writes or modifies. We will also have a server or trusted third party to play the role of bridge between the co-workers and the master, storing the public key and identity list of owners and co-workers. During verification phase, we should first check the signer of the tokens then retrieve the proper public keys to the verifier. We proposed a protocol that can change normal PDP or POR into a shared PDP or a shared POR among many coworkers. The advantage of our scheme is that we can do some access control on the co-workers and keep track of any co-workers’ behavior. If someone cheats, we can undeniably know who the cheater is by examining the fragment of the modified file. We also make some improvements on the BLS signature based PDP making it faster but still secure. Duo to our implementations and experiments, we can truly say that the additional cost of our scheme is acceptable.
Libros sobre el tema "Data possessing"
Kolvankar, V. G. Hardware beam forming system for Gauribidanur seismic array. Mumbai: Bhabha Atomic Research Centre, 2001.
Buscar texto completoKhan, Md Moslem Uddin. Case laws of adverse possession and declaratory suits: Upto date civil reference. Dhaka: Bangladesh Law Book Company, 2006.
Buscar texto completoKhan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2006.
Buscar texto completoKhan, Md Moslem Uddin. Biruddha dakhalī svatva o subidhā adhikāra āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others, up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.
Buscar texto completoKhan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.
Buscar texto completoKhan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.
Buscar texto completoKhan, Md Moslem Uddin. Biruddha dakhalī svatva o Subidhā Adhikāra Āina, 1882 =: The Adverse Possession & the Easements Act, 1882 : BSCD, ADC, DLR, BLD, MLR, BLT, PLT and others Up-to-date rulings. Dhaka: Śaraphuddina La' Buka Kompānī, 2009.
Buscar texto completoThe red thread: Healing possession at a Muslim shrine in North India. Delhi: Aakar Books, 2006.
Buscar texto completoUnited States. Congress. House. Committee on Natural Resources. Subcommittee on Insular Affairs., ed. Census data: Special issues related to U.S. territories : joint hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform and the Subcommittee on Insular Affairs of the Committee on Natural Resources, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.
Buscar texto completoReview of federal expenditure trends: United States insular areas in the Pacific : Consolidated Federal Funds: FY 1997-2010, Federal Assistance Award Data System: FY 2000-2010. Hagåtña, Guam: Department of Labor, 2011.
Buscar texto completoCapítulos de libros sobre el tema "Data possessing"
Tang, Yujin, Kei Yonekawa, Mori Kurokawa, Shinya Wada y Kiyohito Yoshihara. "Binary Classification of Sequences Possessing Unilateral Common Factor with AMS and APR". En Advances in Knowledge Discovery and Data Mining, 322–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93040-4_26.
Texto completoLink, Daniel. "Individual Ball Possession". En Data Analytics in Professional Soccer, 9–28. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21177-6_2.
Texto completoKrzywiecki, Lukasz, Krzysztof Majcher y Wojciech Macyna. "Efficient Probabilistic Methods for Proof of Possession in Clouds". En Data Mining and Big Data, 364–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40973-3_36.
Texto completoZhou, Fucai, Su Peng, Jian Xu y Zifeng Xu. "Identity-Based Batch Provable Data Possession". En Provable Security, 112–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_7.
Texto completoFeng, Chao, Honghong Wang, Wenbo Wan, Qinghua Li y Fangzhou Xu. "Robust/Recover Provable Data Possession Protocol". En Security with Intelligent Computing and Big-data Services, 574–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_46.
Texto completoKadvani, Smit, Aditya Patel, Mansi Tilala, Priteshkumar Prajapati y Parth Shah. "Provable Data Possession Using Identity-Based Encryption". En Information and Communication Technology for Intelligent Systems, 87–94. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1742-2_9.
Texto completoTian, Jun-Feng, Rui-Fang Guo y Xuan Jing. "A Non-repudiable Dynamic Provable Data Possession". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 723–30. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21373-2_61.
Texto completoYu, Yong, Yafang Zhang, Yi Mu, Willy Susilo y Hongyu Liu. "Provably Secure Identity Based Provable Data Possession". En Provable Security, 310–25. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_17.
Texto completoShen, Shiuan-Tzuo y Wen-Guey Tzeng. "Delegable Provable Data Possession for Remote Data in the Clouds". En Information and Communications Security, 93–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_8.
Texto completoLin, Changlu, Fucai Luo, Huaxiong Wang y Yan Zhu. "A Provable Data Possession Scheme with Data Hierarchy in Cloud". En Information Security and Cryptology, 301–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38898-4_18.
Texto completoActas de conferencias sobre el tema "Data possessing"
Guihua Liu, Jinzhi Zhou y Jing Wu. "The design of FPGA possessing UCL in data broadcasting". En 2003 5th International Conference on ASIC Proceedings (IEEE Cat No 03TH8690) ICASIC-03. IEEE, 2003. http://dx.doi.org/10.1109/icasic.2003.1277372.
Texto completoNoël, J. P., L. Renson y G. Kerschen. "Experimental Identification of the Complex Dynamics of a Strongly Nonlinear Spacecraft Structure". En ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12909.
Texto completoDo, Quan, Kris Robinson y Son Tran. "Big Data Analysis: Why Not an Asthma APP?" En InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2216.
Texto completoChen, Liuqing, Feng Shi, Ji Han y Peter R. N. Childs. "A Network-Based Computational Model for Creative Knowledge Discovery Bridging Human-Computer Interaction and Data Mining". En ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67228.
Texto completoErway, Chris, Alptekin Küpçü, Charalampos Papamanthou y Roberto Tamassia. "Dynamic provable data possession". En the 16th ACM conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1653662.1653688.
Texto completoRickli, Jeremy y Jaime Camelio. "Monitoring and Diagnosis of Assembly Fixture Faults Using Modified Multivariate Control Charts and Surface Scanning Content". En ASME 2007 International Manufacturing Science and Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/msec2007-31075.
Texto completoNo, Hidekazu, Michel Call y Akira T. Tokuhiro. "Comparison of Near Wake-Flow Structure Behind a Solid Cap With an Attached Bubble and a Solid Counterpart". En ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45565.
Texto completoChahine, Georges L. y Kenneth M. Kalumuck. "Development of a Near Real-Time Instrument for Nuclei Measurement: The ABS Acoustic Bubble Spectrometer®". En ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45310.
Texto completoChen, Bo y Reza Curtmola. "Robust Dynamic Provable Data Possession". En 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.57.
Texto completoMentes, Ayhan y Ismail H. Helvacioglu. "Review of Fuzzy Set Theory Applications in Safety Assessment for Marine and Offshore Industries". En ASME 2011 30th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2011. http://dx.doi.org/10.1115/omae2011-50244.
Texto completo