-
161
Impact of Effective Out Sourcing on Procurement Contract Performance: A Case Study of Kisoro District Local Government.
Published 2024“…The study was about establishing the effective outsourcing could lead to procurement contract performance. …”
Get full text
Thesis -
162
Plaider la « bonne gouvernance sécuritaire » au Maroc : Domestiquer les savoirs de réforme en régime de contrainte consensuelle
Published 2024-09-01“…During this pivotal moment, the Moroccan regime opened up the outsourcing of the production of reform knowledge relating to security, through the progressive association of NGOs and transnational actors in the development of public policies. …”
Get full text
Article -
163
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01“…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
Get full text
Article -
164
Data access control policy of encrypted deduplication system
Published 2020-05-01“…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
Get full text
Article -
165
Privacy-preserving image processing in cloud computing
Published 2016-01-01“…Meanwhile, the privacy concerns over the abuse of sensitive information contained in outsourced data also arise in public. In fact, once uploaded to the cloud, the security of us-ers’ private information purely depends on the reliability of the cloud service providers (CSP). …”
Get full text
Article -
166
Guidelines for Purchase and Application of Poultry Manure for Organic Crop Production
Published 2004-05-01“…The purpose of this publication, however, is to integrate this information to provide guidelines and references for organic farmers who use outsourced poultry manure or litter in organic crop production. …”
Get full text
Article -
167
Guidelines for Purchase and Application of Poultry Manure for Organic Crop Production
Published 2004-05-01“…The purpose of this publication, however, is to integrate this information to provide guidelines and references for organic farmers who use outsourced poultry manure or litter in organic crop production. …”
Get full text
Article -
168
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Published 2015-01-01“…In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.…”
Get full text
Article -
169
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01“…An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges management,partial data outsource encryption and ciphertext partially decrypted in the cloud server and shared data self-destruction after expiration.…”
Get full text
Article -
170
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01“…Additionally, the scheme employed key policy attribute-based encryption for fine-grained control over search operations, and utilized lightweight encryption algorithm and outsourced decryption mechanism to reduce computational overhead on user terminals. …”
Get full text
Article -
171
La diffusion spatiale de l’informatique en Inde
Published 2009-09-01“…India is an emergent superpower which asserts itself through outsourced services, the so-called “IT industry”. Beyond the fact that InfoTech are seen as a trickle-down development engine, it is the cluster which has become gradually a town planning measure in the sectoral policies followed by the central government and the regional states. …”
Get full text
Article -
172
La invención histórica del desarrollo: una aproximación crítica y latinoamericana al sistema-mundo moderno
Published 2021-05-01“…It is argued that development has been a discourse of transhistoric power that has made Euro-American practices, experiences and traditions a universal cultural model, through which a hegemonic and essentialist vision of the West has been strengthened, while building a deficit and outsourced alterity.…”
Get full text
Article -
173
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
174
Multi-authority attribute-based encryption scheme with policy dynamic updating
Published 2017-10-01“…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
Get full text
Article -
175
Survey on the privacy-preserving content based image retrieval
Published 2019-08-01“…With the widespread popularity of smart devices and social media,the number of image data is exponentially increasing.The data owners tend to outsource the local data to the cloud servers,where data is stored,shared and retrieved.However,the content of users’ image data contains a lot of sensitive information,which may be exposed to the attackers and the incomplete trusted cloud servers,resulting in a serious risk of privacy leakage to users.The research progress of the content-based image retrieval technology under the privacy-preserving in recent years were reviewed,and the key image cryptographic technology were summarized,including homomorphic encryption,randomized encryption and comparative encryption.Around these techniques,the typical solutions are analyzed and compared in detail,and the improvement strategies of index construction are introduced.Finally,the future research directions are discussed.…”
Get full text
Article -
176
The implications of ‘jam’ and other ideation technologies for organisational decision making
Published 2009-11-01“…Research and development can now be outsourced to external self-organising communities of scientists, new business models rely wholly on content created by end users and customers are increasingly asked for input to the development of new products and services. …”
Get full text
Article -
177
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01“…And, enabling public auditability for cloud storage is of critical importance to users with constrained computing resources, who can resort to a third party auditor to check the integrity of outsourced data. However, most of the existing auditing schemes do not consider data privacy problem. …”
Get full text
Article -
178
Cloud data assured deletion scheme based on overwrite verification
Published 2019-01-01“…At the end of data life cycle,there is still a risk of data leakage,because mostly data which was stored in cloud is removed by logical deletion of the key.Therefore,a cloud data assured deletion scheme (WV-CP-ABE) based on ciphertext re-encrypt and overwrite verification was proposed.When data owner wants to delete the outsourced data,the data fine-grained deletion operation was realized by re-encrypting the ciphertext to change the access control policy.Secondly,a searchable path hash binary tree (DSMHT) based on dirty data block overwrite was built to verify the correctness of the data to be deletion.Finally,the dual mechanism of changing the ciphertext access control policy and data overwriting guarantees the data assured deletion.The experimental analysis proves that the fine-grained control is better and the security is more reliable than the previous logical delete method in the assured deletion of data.…”
Get full text
Article -
179
A systemic perspective on bridging the principles-to-practice gap in creating ethical artificial intelligence solutions – a critique of dominant narratives and proposal for a coll...
Published 2024-12-01“…We critique demands in artificial intelligence and technology development for bridging the so-called principles-to-practice gap that are voiced for instrumental reasons, such as accelerating adoption or creating trust, via clearly actionable ethical rules or via outsourced guidance offered by ethics ‘experts.’ We contend that these views are prone to amount to a simple reconfiguration of technical implementation. …”
Get full text
Article -
180
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
Published 2021-03-01“…It is unwise to locally store all the raw data in the IIoT devices since the energy and storage spaces of the end devices are strictly constrained. self-organization and short-range Internet of Things (IoT) networking also support outsourced data and cloud computing, independent of the distinctive resource constraint properties. …”
Get full text
Article