咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
  • 1 篇 理学
    • 1 篇 化学

主题

  • 9 篇 secure query pro...
  • 3 篇 web warehouse
  • 3 篇 cryptography
  • 2 篇 fog computing
  • 1 篇 data warehouse
  • 1 篇 padding
  • 1 篇 secure distribut...
  • 1 篇 internet of thin...
  • 1 篇 homomorphic encr...
  • 1 篇 volume leakage
  • 1 篇 privacy aware da...
  • 1 篇 multi party
  • 1 篇 data aggregation
  • 1 篇 iot
  • 1 篇 bliss signature
  • 1 篇 lightweight appr...
  • 1 篇 securing hybrid ...
  • 1 篇 security
  • 1 篇 bucketization
  • 1 篇 declarative netw...

机构

  • 2 篇 beijing normal u...
  • 2 篇 preston univ dep...
  • 1 篇 department of co...
  • 1 篇 georgetown univ ...
  • 1 篇 dept. of compute...
  • 1 篇 inesc tec porto
  • 1 篇 us air force res...
  • 1 篇 dept. of cs & it...
  • 1 篇 univ management ...
  • 1 篇 teradata san die...
  • 1 篇 univ msit dept c...
  • 1 篇 indian inst info...
  • 1 篇 univ minho braga
  • 1 篇 college of infor...
  • 1 篇 texas christian ...
  • 1 篇 at&t labs res fl...
  • 1 篇 new jersey insti...
  • 1 篇 univ penn philad...
  • 1 篇 howard univ dept...
  • 1 篇 himachal pradesh...

作者

  • 2 篇 shaikh maqbool u...
  • 2 篇 mehmood rashid
  • 2 篇 bie rongfang
  • 1 篇 singh ashutosh k...
  • 1 篇 shantanu sharma
  • 1 篇 tao tao
  • 1 篇 machado nuno
  • 1 篇 vilaca ricardo
  • 1 篇 rashid mehmood
  • 1 篇 begna geremew
  • 1 篇 dawood hussain
  • 1 篇 shanshan han
  • 1 篇 dawood hassan
  • 1 篇 maqbool uddin sh...
  • 1 篇 ma liran
  • 1 篇 saini hemraj
  • 1 篇 rongfang bie
  • 1 篇 michael t. goodr...
  • 1 篇 loo boon thau
  • 1 篇 garuba moses

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"主题词=secure query processing"
9 条 记 录,以下是1-10 订阅
排序:
SURETY-Fog: secure Data query and Storage processing in Fog Driven IoT Environment
收藏 引用
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS 2025年 46卷
作者: Sharma, Pratibha Saini, Hemraj Kalia, Arvind Himachal Pradesh Univ Dept Comp Sci Shimla 171005 India DIT Univ Sch Comp Dehra Dun 248009 India
Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all ... 详细信息
来源: 评论
A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第6期27卷 7389-7400页
作者: Kumar, Jatinder Singh, Ashutosh Kumar Natl Inst Technol Kurukshetra Dept Comp Applicat Kurukshetra 136119 Haryana India Indian Inst Informat Technol Bhopal Bhopal 462003 Madhya Pradesh India
A smart meter is an automation technology that sends real-time power consumption of electric appliances to the outsourced cloud through the aggregator node. An outsourced cloud is used by the Utility providers to rele... 详细信息
来源: 评论
Veil: A Storage and Communication Efficient Volume-Hiding Algorithm
收藏 引用
Proceedings of the ACM on Management of Data 2023年 第4期1卷 1-27页
作者: Shanshan Han Vishal Chakraborty Michael T. Goodrich Sharad Mehrotra Shantanu Sharma University of California Irvine Irvine CA USA New Jersey Institute of Technology Newark NJ USA
This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about d... 详细信息
来源: 评论
d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds  38
d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds
收藏 引用
IEEE 38th International Symposium on Reliable Distributed Systems (SRDS)
作者: Pontes, Rogerio Maia, Francisco Vilaca, Ricardo Machado, Nuno INESC TEC HASLab High Assurance Software Lab Porto Portugal Univ Minho Braga Portugal Teradata San Diego CA USA INESC TEC Porto Portugal
Privacy sensitive applications that store confidential information such as personal identifiable data or medical records have strict security concerns. These concerns hinder the adoption of the cloud. With cloud provi... 详细信息
来源: 评论
secureCASH: Securing Context-Aware Distributed Storage and query processing in Hybrid Cloud Framework  6
SecureCASH: Securing Context-Aware Distributed Storage and Q...
收藏 引用
6th IEEE Conference on Communications and Network Security (CNS)
作者: Begna, Geremew Rawat, Danda B. Garuba, Moses Njilla, Laurent Howard Univ Dept Elect Engn & Comp Sci Cybersecur & Wireless Networking Innovat CWiNs La Washington DC 20059 USA US Air Force Res Lab Cyber Assurance Branch Rome NY USA
With the evolution of lightweight hand-held devices and successful deployment of wired and wireless networks for day-to-day operations, organizations are producing massive data aka big data with 4Vs: volume, variety, ... 详细信息
来源: 评论
IoT-enabled Web warehouse architecture: a secure approach
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2015年 第7期19卷 1157-1167页
作者: Mehmood, Rashid Shaikh, Maqbool Uddin Bie, Rongfang Dawood, Hussain Dawood, Hassan Beijing Normal Univ Coll Informat Sci & Technol Beijing 100875 Peoples R China Univ Management Sci & Informat Technol Dept Comp Sci & Informat Technol Kotli Ajk Pakistan Preston Univ Dept Comp Sci Islamabad Pakistan
Web warehouse (WWh) has overcome the geographical dependencies of data warehouse. With the rapid development of WWh, decision makers (humans) and intelligent devices are able to remotely retrieve the information for s... 详细信息
来源: 评论
Enhanced Web Warehouse Model: A secure Approach
Enhanced Web Warehouse Model: A Secure Approach
收藏 引用
International Conference on Identification, Information and Knowledge in the Internet of Things
作者: Mehmood, Rashid Ma, Liran Shaikh, Maqbool Uddin Bie, Rongfang Univ MSIT Dept CS & IT Kotli Pakistan Texas Christian Univ Dept Comp Sci Ft Worth TX 76129 USA Preston Univ Dept Comp Sci Islamabad Pakistan Beijing Normal Univ Coll Informat Sci & Technol Beijing Peoples R China
Web Warehouse has conquered the limitation of data warehouse geographical dependencies. With the advent of web warehouse, now decision makers of an organization can retrieve decisions related knowledge through interne... 详细信息
来源: 评论
Enhanced Web Warehouse Model:A secure Approach
Enhanced Web Warehouse Model:A Secure Approach
收藏 引用
2014International Conference on Identification,Information and Knowledge in The Internet of Things(2014信息与知识物联网国际会议)
作者: Rashid Mehmood Maqbool Uddin Shaikh Liran Ma Rongfang Bie Dept. of CS & IT University of MSIT Kotli AJK Pakistan Dept. of Computer Science Preston University (ISB. Campus) Islamabad Pakistan Department of Computer Science Texas Christian University Fort Worth TX 76129USA College of Information Science and Technology Beijing Normal University Beijing China
Web Warehouse has conquered the limitation of data warehouse geographical *** the advent of web warehouse,now decision makers of an organization can retrieve decisions related knowledge through *** data is fetched fro... 详细信息
来源: 评论
Declarative secure distributed information systems
收藏 引用
COMPUTER LANGUAGES SYSTEMS & STRUCTURES 2013年 第1期39卷 1-24页
作者: Zhou, Wenchao Tao, Tao Loo, Boon Thau Mao, Yun Georgetown Univ Washington DC 20057 USA Univ Penn Philadelphia PA 19104 USA AT&T Labs Res Florham Pk NJ 07932 USA
We present a unified declarative platform for specifying, implementing, and analyzing secure networked information systems. Our work builds upon techniques from logic-based trust management systems and declarative net... 详细信息
来源: 评论