-
41
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…With the development of the electronic medical field, Electronic health record (EHR) are often outsourced to fog nodes for distributed storage to enhance reliability. …”
Get full text
Article -
42
Business process outsourcing as a key strategy of enterprises in an unstable economic situation
Published 2020-12-01Subjects: Get full text
Article -
43
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: Get full text
Article -
44
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: “…outsourcing cloud computing…”
Get full text
Article -
45
Making outsourcing decisions based on activity costing and their role in achieving sustainable value
Published 2025-02-01Get full text
Article -
46
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01Subjects: “…outsourcing cloud computing…”
Get full text
Article -
47
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01“…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
Get full text
Article -
48
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. …”
Get full text
Article -
49
THE IMPACT OF HUMAN RESOURCE OUTSOURCING ON EMPLOYEE PERFORMANCE (A CASE STUDY OF ACCESS BANKPLC)
Published 2022-12-01Subjects: “…Outsourcing…”
Get full text
Article -
50
Optimal Control of a Make-to-Stock System with Outsourced Production and Price-Sensitive Demand
Published 2014-01-01“…We consider a make-to-stock system with controllable demand rate (by varying product selling price) and adjustable service rate (by outsourcing production). With one outsourcing alternative and a choice of either high or low price, the system decides at any point in time whether to produce or even outsource for additional capacity as well as which price to sell the product at. …”
Get full text
Article -
51
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01Subjects: Get full text
Article -
52
Optimization of Enterprise Costs Through Outsourcing in Accounting and Taxation in the Context of Anti-Crisis Management
Published 2024-12-01Subjects: Get full text
Article -
53
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01Get full text
Article -
54
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01Subjects: Get full text
Article -
55
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01Subjects: Get full text
Article -
56
Comparative analysis of outsourcing and in house warehouse management system to improve productivity and stock accuracy
Published 2024-12-01“…This study compares the impact of outsourced and in-house Warehouse Management Systems (WMS) on productivity and stock accuracy in the fast-moving consumer goods (FMCG) sector. …”
Get full text
Article -
57
Twine France Winddance, Outsourcing the Womb: Race, Class, and Gestational Surrogacy in a Global Market
Published 2012-12-01Get full text
Article -
58
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01Subjects: Get full text
Article -
59
Dampak Strategi Offshore Outsourcing Dalam Bisnis Fast Fashion Terhadap Degradasi Lingkungan di Bangladesh
Published 2023-07-01Subjects: Get full text
Article -
60
Labor Outsourcing in the Steelmaking Industry in Argentina: Companies of Ex-workers in Acindar Villa Constitución and Siderar Ensenada
Published 2019-05-01“…Labor outsourcing as a business strategy that tends to increase flexibility and the precarization of the workforce, as well as weaken trade unions, has become worse since the mid-1970s. …”
Get full text
Article