Showing 41 - 60 results of 196 for search '"outsourcing"', query time: 0.05s Refine Results
  1. 41

    Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage by ZHANG Xiaoxu, CHEN Yuchen, HA Guanxiong, JIA Chunfu

    Published 2024-09-01
    “…With the development of the electronic medical field, Electronic health record (EHR) are often outsourced to fog nodes for distributed storage to enhance reliability. …”
    Get full text
    Article
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47

    Efficient and secure multi-user outsourced image retrieval scheme with access control by Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU

    Published 2021-10-01
    “…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
    Get full text
    Article
  8. 48

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. …”
    Get full text
    Article
  9. 49
  10. 50

    Optimal Control of a Make-to-Stock System with Outsourced Production and Price-Sensitive Demand by Liuxin Chen, Gang Hao, Huimin Wang

    Published 2014-01-01
    “…We consider a make-to-stock system with controllable demand rate (by varying product selling price) and adjustable service rate (by outsourcing production). With one outsourcing alternative and a choice of either high or low price, the system decides at any point in time whether to produce or even outsource for additional capacity as well as which price to sell the product at. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56

    Comparative analysis of outsourcing and in house warehouse management system to improve productivity and stock accuracy by Untung Alamsah, Anang Muftiadi, ⁠Ria Arifianti

    Published 2024-12-01
    “…This study compares the impact of outsourced and in-house Warehouse Management Systems (WMS) on productivity and stock accuracy in the fast-moving consumer goods (FMCG) sector. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59
  20. 60

    Labor Outsourcing in the Steelmaking Industry in Argentina: Companies of Ex-workers in Acindar Villa Constitución and Siderar Ensenada by María Alejandra Esponda, Julia Strada

    Published 2019-05-01
    “…Labor outsourcing as a business strategy that tends to increase flexibility and the precarization of the workforce, as well as weaken trade unions, has become worse since the mid-1970s. …”
    Get full text
    Article