Scholarly Collaboration On The Academic Social Web He, Daqing / Jeng, Wei Morgan & Claypool Publishers |
Database Anonymization: Privacy Models, Data Utility, And Microaggregation-Based Domingo-Ferrer, Josep / Sánchez, David / Soria-Comas, Jordi Morgan & Claypool Publishers |
Dynamic Information Retrieval Modeling Hui Yang, Grace / Sloan, Marc / Wang, Jun Morgan & Claypool Publishers |
Learning From Multiple Social Networks Nie, Liqiang / Song, Xuemeng / Chua, Tat-Seng Morgan & Claypool Publishers |
Trustworthy Policies For Distributed Repositories W. Moore, Reagan / Xu, Hao / Conway, Mike / Rajasekar, Arcot Morgan & Claypool Publishers |
Notion Of Relevance In Information Science, The: Eveybody Knows What Relevance I Saracevic, Tefko Morgan & Claypool Publishers |
Semantic Interaction For Visual Analytics: Inferring Analytical Reasoning For Mo Endert, Alex Morgan & Claypool Publishers |
Implementing And Assessing Use-Driven Acquiitions: A Practical Guide For Librari Carrico, Steven / Leonard, Michelle / Gallagher, Erin Rowman & Littlefield Publisher Inc |
Título: Introduction To Secure Outsourcing Computation | ||
Autor: Chen, Xiaofeng | Precio: $1000.00 | |
Editorial: Morgan & Claypool Publishers | Año: 2016 | |
Tema: Informacion, Seguridad, Literatura Mexicana | Edición: 1ª | |
Sinopsis | ISBN: 9781627057912 | |
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications.
The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security |