Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Security and privacy in cloud computing
Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
Anonymous and traceable group data sharing in cloud computing
Group data sharing in cloud environments has become a hot topic in recent decades. With
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …
A review on the state-of-the-art privacy-preserving approaches in the e-health clouds
A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …
besides other business domains. Large numbers of health organizations have started …
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
X Liu, Y Zhang, B Wang, J Yan - IEEE transactions on parallel …, 2012 - ieeexplore.ieee.org
With the character of low maintenance, cloud computing provides an economical and
efficient solution for sharing group resource among cloud users. Unfortunately, sharing data …
efficient solution for sharing group resource among cloud users. Unfortunately, sharing data …
TrustCloud: A framework for accountability and trust in cloud computing
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …
potential customers. While preventive controls for security and privacy are actively …
Decentralized access control with anonymous authentication of data stored in clouds
We propose a new decentralized access control scheme for secure data storage in clouds
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
that supports anonymous authentication. In the proposed scheme, the cloud verifies the …
Methods for internet communication security
M Clark, A Gordon, M Clark - US Patent 10,361,859, 2019 - Google Patents
H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure
communications; Network security protocols including means for verifying the identity or …
communications; Network security protocols including means for verifying the identity or …
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …
Technical issues of forensic investigations in cloud computing environments
D Birk, C Wegener - 2011 Sixth IEEE international workshop on …, 2011 - ieeexplore.ieee.org
Cloud Computing is arguably one of the most discussed information technologies today. It
presents many promising technological and economical opportunities. However, many …
presents many promising technological and economical opportunities. However, many …