Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion
F Wang, P De Filippi - Frontiers in Blockchain, 2020 - frontiersin.org
After introducing key concepts and definitions in the field of digital identity, this paper will
investigate the benefits and drawbacks of existing identity systems on the road toward …
investigate the benefits and drawbacks of existing identity systems on the road toward …
TrustedDB: a trusted hardware based database with privacy and data confidentiality
S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …
with privacy and under regulatory compliance constraints without having to trust the service …
Distributed, concurrent, and independent access to encrypted cloud databases
Placing critical data in the hands of a cloud provider should come with the guarantee of
security and availability for data at rest, in motion, and in use. Several alternatives exist for …
security and availability for data at rest, in motion, and in use. Several alternatives exist for …
[LIVRE][B] Computing handbook: Information systems and information technology
H Topi, A Tucker - 2014 - books.google.com
The second volume of this popular handbook demonstrates the richness and breadth of the
IS and IT disciplines. The book explores their close links to the practice of using, managing …
IS and IT disciplines. The book explores their close links to the practice of using, managing …
Managing omni-customer brand experience via augmented reality: A qualitative investigation in the Italian fashion retailing system
Purpose The adoption of augmented reality (AR) settings represents an extraordinary
opportunity to enrich the value of the omni-customer brand experience, especially in fashion …
opportunity to enrich the value of the omni-customer brand experience, especially in fashion …
Co-residence based data vulnerability vs. security in cloud computing system with random server assignment
The virtualization technology, particularly virtual machines (VMs) used in cloud computing
systems have raised unique security and survivability risks for cloud users. This paper …
systems have raised unique security and survivability risks for cloud users. This paper …
Privacy-preserving data outsourcing in the cloud via semantic data splitting
Even though cloud computing provides many intrinsic benefits (eg, cost savings, availability,
scalability, etc.), privacy concerns related to the lack of control over the storage and …
scalability, etc.), privacy concerns related to the lack of control over the storage and …
Optimal data partitioning in cloud computing system with random server assignment
Cloud computing provides a paradigm where users can utilize various configurable IT
resources in an on-demand and cost-effective manner. However, new security risks such as …
resources in an on-demand and cost-effective manner. However, new security risks such as …