This paper describes a security problem involving an online data repository which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository’s host is trusted to honestly fulfil its duties in maintaining the data in a manner consistent with each companies’ required services. However, the information stored by the repository remains private in that the repository’s host cannot openly read any companies’ operational data, nor does it learn the identities of any companies’ customers. We contrast several approaches describing their viability for web deployment using existing technologies. This is a fundamentally new security problem with no established literature or clearly d...
On the internet today, everything is centralized. For most people, a single commercial entity owns t...
This paper spotlights privacy and its obfuscation issues of intellectual, confidential information o...
While online service providers are sometimes accused of forwarding identifying customer information ...
This paper describes a security problem involving an online data repository, which acts as a proxy f...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
In this paper, we explore a new paradigm for data management in which a third party service provider...
In the last few years, the wide availability of computational and storage resources at low prices ha...
International audienceUnidirectional proxy re-encryption (PRE) can be used to realize an efficient a...
As the wealth of quality application services grows, so too does the volume of data that users disc...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
Abstract: Advances in networking technologies and the continued growth of the Internet have triggere...
NoThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a we...
Publish/subscribe (pub/sub) is a widely deployed paradigm for information dissemination in a variety...
The emergence of Application Service Providers hosting Internet-based data mining services is being ...
On the internet today, everything is centralized. For most people, a single commercial entity owns t...
This paper spotlights privacy and its obfuscation issues of intellectual, confidential information o...
While online service providers are sometimes accused of forwarding identifying customer information ...
This paper describes a security problem involving an online data repository, which acts as a proxy f...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
In this paper, we explore a new paradigm for data management in which a third party service provider...
In the last few years, the wide availability of computational and storage resources at low prices ha...
International audienceUnidirectional proxy re-encryption (PRE) can be used to realize an efficient a...
As the wealth of quality application services grows, so too does the volume of data that users disc...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
Abstract: Advances in networking technologies and the continued growth of the Internet have triggere...
NoThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a we...
Publish/subscribe (pub/sub) is a widely deployed paradigm for information dissemination in a variety...
The emergence of Application Service Providers hosting Internet-based data mining services is being ...
On the internet today, everything is centralized. For most people, a single commercial entity owns t...
This paper spotlights privacy and its obfuscation issues of intellectual, confidential information o...
While online service providers are sometimes accused of forwarding identifying customer information ...