Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure network provenance
This paper introduces secure network provenance (SNP), a novel technique that enables
networked systems to explain to their operators why they are in a certain state--eg, why a …
networked systems to explain to their operators why they are in a certain state--eg, why a …
Authenticating the query results of text search engines
HH Pang, K Mouratidis - Proceedings of the VLDB Endowment, 2008 - dl.acm.org
The number of successful attacks on the Internet shows that it is very difficult to guarantee
the security of online search engines. A breached server that is not detected in time may …
the security of online search engines. A breached server that is not detected in time may …
Integrity for join queries in the cloud
We address the problem of providing users with the ability to assess the integrity of join
results produced by external computational providers and computed over externally stored …
results produced by external computational providers and computed over externally stored …
Secure top-k query processing via untrusted location-based service providers
This paper considers a novel distributed system for collaborative location-based information
generation and sharing which become increasingly popular due to the explosive growth of …
generation and sharing which become increasingly popular due to the explosive growth of …
Secure outsourced aggregation via one-way chains
S Nath, H Yu, H Chan - Proceedings of the 2009 ACM SIGMOD …, 2009 - dl.acm.org
We consider the Outsourced Aggregation model, where sensing services outsource their
sensor data collection and aggregation tasks to third-party service providers called …
sensor data collection and aggregation tasks to third-party service providers called …
Secure spatial top-k query processing via untrusted location-based service providers
This paper considers a novel distributed system for collaborative location-based information
generation and sharing which become increasingly popular due to the explosive growth of …
generation and sharing which become increasingly popular due to the explosive growth of …
Query assurance verification for outsourced multi-dimensional databases
W Cheng, KL Tan - Journal of Computer Security, 2009 - content.iospress.com
In data outsourcing model, data owners engage third-party data servers (called publishers)
to manage their data and process queries on their behalf. As these publishers may be …
to manage their data and process queries on their behalf. As these publishers may be …
Freshness authentication for outsourced multi-version key-value stores
Data outsourcing is a promising technical paradigm to facilitate cost-effective real-time data
storage, processing, and dissemination. In data outsourcing, a data owner proactively …
storage, processing, and dissemination. In data outsourcing, a data owner proactively …
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of
the focus primarily concentrated on securing the operating systems and virtual machines on …
the focus primarily concentrated on securing the operating systems and virtual machines on …
Integrity for distributed queries
We propose an approach for allowing users to assess the integrity of distributed queries
computed by a computational cloud, which is trusted neither for data confidentiality nor for …
computed by a computational cloud, which is trusted neither for data confidentiality nor for …