咨询与建议

限定检索结果

文献类型

  • 37 篇 会议
  • 33 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 71 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 53 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 19 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 3 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 71 篇 data fragmentati...
  • 8 篇 security
  • 5 篇 encryption
  • 4 篇 data security
  • 4 篇 nosql
  • 4 篇 data allocation
  • 4 篇 disk bottleneck
  • 4 篇 cloud computing
  • 3 篇 reliability
  • 3 篇 replication
  • 3 篇 cloud environmen...
  • 3 篇 routing
  • 3 篇 nosql database
  • 3 篇 big data
  • 3 篇 deduplication
  • 3 篇 all-or-nothing
  • 3 篇 distributed data...
  • 3 篇 multi-cloud
  • 3 篇 machine learning
  • 3 篇 cloud security

机构

  • 4 篇 telecom paristec...
  • 2 篇 univ autonoma es...
  • 2 篇 univ fed parana ...
  • 2 篇 sungkyunkwan uni...
  • 1 篇 ibm corp almaden...
  • 1 篇 china waterborne...
  • 1 篇 inca engn accide...
  • 1 篇 oregon state uni...
  • 1 篇 georgia inst tec...
  • 1 篇 univ sfax mir cl...
  • 1 篇 abdullah gul uni...
  • 1 篇 icf 9300 lee hig...
  • 1 篇 univ papaloapan ...
  • 1 篇 univ toulouse je...
  • 1 篇 univ bergamo dip...
  • 1 篇 school of comput...
  • 1 篇 univ alberta can...
  • 1 篇 islamic univ leb...
  • 1 篇 glenn res ctr cl...
  • 1 篇 univ manchester ...

作者

  • 6 篇 kapusta katarzyn...
  • 6 篇 memmi gerard
  • 3 篇 rodriguez-mazahu...
  • 3 篇 castro-medina fe...
  • 3 篇 ghita bogdan
  • 3 篇 masala giovanni
  • 3 篇 santos nelson
  • 3 篇 godavari amdewar
  • 3 篇 sudhakar chapram
  • 2 篇 toth andrew
  • 2 篇 qiu han
  • 2 篇 uyan osman gokha...
  • 2 篇 schroeder rebeca
  • 2 篇 ye jun
  • 2 篇 heni houyem
  • 2 篇 lim keun-woo
  • 2 篇 wampler jason a.
  • 2 篇 gungor vehbi cag...
  • 2 篇 alor-hernandez g...
  • 2 篇 gargouri faiez

语言

  • 65 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=Data fragmentation"
71 条 记 录,以下是11-20 订阅
排序:
Study on the Countermeasure of Security Problems of Big data Caused by data fragmentation
Study on the Countermeasure of Security Problems of Big Data...
收藏 引用
2nd International Conference on Computer Engineering,Information Science & Application Technology(ICCIA 2017)
作者: Peng Ni Shibo Xu Hang Ma China waterborne transport research institute Peking University
The analysis and application of big data has become the frontier science at this era. People make universal attentions on the values that are existing or potential brought by the application of big data, but they make... 详细信息
来源: 评论
data Encryption and fragmentation in Autonomous Vehicles using Raspberry Pi 3
Data Encryption and Fragmentation in Autonomous Vehicles usi...
收藏 引用
IEEE World Congress on Services (IEEE SERVICES)
作者: Murad, Sahand Khan, Asiya Shiaeles, Stavros Masala, Giovanni Univ Plymouth Plymouth Devon England Manchester Metropolitan Univ Manchester Lancs England
Autonomous vehicles have huge potential in improving road safety and congestion. Towards the road map of full autonomy, each vehicle will be able to communicate with other vehicles within the network of vehicles to im... 详细信息
来源: 评论
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2019年 第3-4期74卷 157-165页
作者: Kapusta, Katarzyna Memmi, Gerard Noura, Hassan Telecom ParisTech LTCI Paris France Amer Univ Beirut Dept Elect & Comp Engn Beirut Lebanon
data fragmentation and dispersion is recognized as a way of providing confidentiality and availability of data stored inside unattended wireless sensor networks. This paper introduces an additively homomorphic encrypt... 详细信息
来源: 评论
fragmentation in Presence of data Dependencies
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2014年 第6期11卷 510-523页
作者: di Vimercati, Sabrina De Capitani Foresti, Sara Jajodia, Sushil Livraga, Giovanni Paraboschi, Stefano Samarati, Pierangela Univ Milan Dipartimento Informat I-26013 Crema Italy George Mason Univ Ctr Secure Informat Syst Fairfax VA 22030 USA Univ Bergamo Dipartimento Ingn I-24044 Dalmine BG Italy
fragmentation has been recently proposed as a promising approach to protect the confidentiality of sensitive associations whenever data need to undergo external release or storage. By splitting attributes among differ... 详细信息
来源: 评论
Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme
收藏 引用
INFORMATION SECURITY JOURNAL 2016年 第1-3期25卷 39-53页
作者: Sareen, Sanjay Sood, Sandeep K. Gupta, Sunil Kumar Guru Nanak Dev Univ Comp Sect Amritsar Punjab India IK Gujral Punjab Tech Univ Kapurthala Punjab India Guru Nanak Dev Univ Reg Campus Dept Comp Sci & Engn Gurdaspur India Beant Coll Engn & Technol Dept Comp Sci & Engn Gurdaspur India
database outsourcing is a new model that offers reliable storage and efficient query execution to clients. Maintaining the confidentiality of data from the service provider is the challenge presented by the growth of ... 详细信息
来源: 评论
data confidentiality using fragmentation in cloud computing
收藏 引用
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2013年 第1期9卷 37-+页
作者: Hudic, Aleksandar Islam, Shareeful Kieseberg, Peter Rennert, Sylvi Weippl, Edgar R. SBA Res gGmbH Vienna Austria Univ East London Sch Architecture Comp & Engn ACE London England
Purpose - The aim of this research is to secure the sensitive outsourced data with minimum encryption within the cloud provider. Unfaithful solutions for providing privacy and security along with performance issues by... 详细信息
来源: 评论
Enhancing data protection in a distributed storage environment using structure-wise fragmentation and dispersal of encrypted data  17
Enhancing data protection in a distributed storage environme...
收藏 引用
17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 12th IEEE International Conference on Big data Science and Engineering (IEEE BigdataSE)
作者: Kapusta, Katarzyna Memmi, Gerard Univ Paris Saclay Telecom ParisTech LTCI Paris France
We present a simple and effective way of fragmentation and dispersal of data encrypted with block ciphers. The method takes into consideration the block structure of the ciphertext, as well as the chaining properties ... 详细信息
来源: 评论
Combining fragmentation and Encryption to Ensure Big data at Rest Security  1
收藏 引用
17th International Conference on Hybrid Intelligent Systems (HIS)
作者: Heni, Houyem Ben Abdallah, Marwa Gargouri, Faiez Univ Sfax MIR CL Lab Sfax Tunisia
We are in the midst of a revolution within computing, it goes under the name of big data. Thus, Due to big data proliferation and the various information resources, our personal data will be shared and published by al... 详细信息
来源: 评论
Poster Abstract: Secure data Sharing by Means of fragmentation, Encryption, and Dispersion
Poster Abstract: Secure Data Sharing by Means of Fragmentati...
收藏 引用
IEEE Conference on Computer Communications (IEEE INFOCOM)
作者: Kapusta, Katarzyna Qiu, Han Memmi, Gerard Telecom ParisTech LTCI Paris France
Outsourcing data to the cloud raise several security challenges. Among others, a user may fear that their data could be exposed during a data breach, misused by the storage provider, or acquired by an attacker observi... 详细信息
来源: 评论
DSM: A Low-Overhead, High-Performance, Dynamic Stream Mapping Approach for MongoDB
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2019年 第2期35卷 447-469页
作者: Nguyen, Trong-Dat Lee, Sang-Won Sungkyunkwan Univ Coll Informat & Commun Engn Suwon 16419 South Korea
For write-intensive workloads, reclaiming free blocks in flash SSDs is expensive due to data fragmentation problem that leads to performance degradation. This paper addresses that problem in MongoDB, a popular documen... 详细信息
来源: 评论