Inicio > > Informática: cuestiones generales > Verbesserter Datenschutz-Mechanismus für Cloud-Speicher
Verbesserter Datenschutz-Mechanismus für Cloud-Speicher

Verbesserter Datenschutz-Mechanismus für Cloud-Speicher

Ateeq-ur Rahman / Mohammed Nadeemuddin

48,55 €
IVA incluido
Disponible
Editorial:
KS OmniScriptum Publishing
Año de edición:
2023
Materia
Informática: cuestiones generales
ISBN:
9786206636502
48,55 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

In diesem Buch habe ich einen neuartigen Zwei-Faktor-Datenschutzmechanismus für Cloud-Speichersysteme vorgestellt, bei dem ein Datensender die Daten nur mit dem Wissen um die Individualität eines Empfängers verschlüsseln darf, während der Empfänger sowohl seinen geheimen Schlüssel als auch ein Sicherheitsgerät verwenden muss, um das Recht zur Nutzung der Daten zu erhalten. Unsere Lösung verbessert nicht nur die Vertraulichkeit der Daten, sondern bietet auch die Zuverlässigkeit des Geräts, so dass, sobald das Gerät widerrufen wird, der entsprechende verschlüsselte Text wiederholt vom Cloud-Server umstrukturiert wird, ohne dass der Besitzer der Daten davon erfährt. Darüber hinaus haben wir den Sicherheitsnachweis und die Effizienzanalyse für unser System zugänglich gemacht. BIBLIOGRAPHIE [1] A. Akavia, S. Goldwasser, and V. Vaikuntanathan, 'Simultaneous hardcore bits and cryptography against memory attacks,' in Proc. 6th Theory Cryptography Conf., 2009, pp. 474-495. [2] S. S. Al-Riyami und K. G. Paterson, 'Certificateless public key cryptography,' in Proc. 9th Int. Conf. Theory Appl. Cryptol., 2003, S. 452-473.

Artículos relacionados

  • Interview with Jeffery Khoury, Bringing Telemedicine to the People
    Richard G Lowe Jr
    Did you know you can consult with a medical specialist over your smartphone from the comfort of your own home? Imagine speaking to a highly-trained and accredited doctor about whatever is ailing you from virtually anywhere in the world.Thanks to a young entrepreneur named Jeffery Khoury, you can get the advice you need from a pool of medical specialists without waiting in a doc...
    Disponible

    5,82 €

  • IT Consulting Secrets
    Carl A Katz
    This book is for IT consultants of all experience levels and the content is relevant to any IT support business model from managed services (MSP) to break/fix. The author has methodically compiled these strategies and this information from over sixteen years of experience working in the IT support field at the small and medium sized business and enterprise levels. ...
    Disponible

    29,41 €

  • Modeling, Analysis, and Applications in Metaheuristic Computing
    Peng-Yeng Yin
    The engineering and business problems the world faces today have become more impenetrable and unstructured, making the design of a satisfactory problem-specific algorithm nontrivial. Modeling, Analysis, and Applications in Metaheuristic Computing: Advancements and Trends is a collection of the latest developments, models, and applications within the transdisciplinary fields rel...
    Disponible

    256,24 €

  • Knowledge Management and Drivers of Innovation in Services Industries
    Knowledge Management is concerned with all aspects of eliciting, acquiring, modelling, and managing knowledge. Application of knowledge resources successfully helps the organization to deliver creative products and services. Especially in service business, service job experience and information about the customer, as well as the installed site equipment, are key factors to deli...
    Disponible

    229,79 €

  • Current Trends and Future Practices for Digital Literacy and Competence
    Antonio Cartelli
    Being a digital citizen has transformed from a process of familiarizing ones’ self with terminology and techniques to a full-time responsibility in the hands of any who want to stay abreast of the latest technological change in their respective field. Current Trends and Future Practices for Digital Literacy and Competence offers a look at the latest research within digital lite...
    Disponible

    229,55 €

  • Human Rights and Risks in the Digital Era
    Globalization, along with its digital and information communication technology counterparts, including the Internet and cyberspace, may signify a whole new era for human rights, characterized by new tensions, challenges, and risks for human rights, as well as new opportunities. Human Rights and Risks in the Digital Era: Globalization and the Effects of Information Technologies ...
    Disponible

    236,37 €

Otros libros del autor

  • Mecanismo melhorado de proteção de dados para armazenamento em nuvem
    Ateeq-ur Rahman / Mohammed Nadeemuddin
    Neste livro, introduzi um novo mecanismo de proteção de segurança de dados de dois factores para o sistema de armazenamento em nuvem, no qual um remetente de dados pode encriptar os dados apenas com o conhecimento da individualidade de um recetor, enquanto o recetor tem de utilizar a sua chave secreta e um dispositivo de segurança para obter o direito de utilização dos dados. A...
    Disponible

    48,55 €

  • Mécanisme de protection des données amélioré pour le stockage en nuage
    Ateeq-ur Rahman / Mohammed Nadeemuddin
    Dans cet ouvrage, j’ai présenté un nouveau mécanisme de protection de la sécurité des données à deux facteurs pour le système de stockage en nuage, dans lequel un expéditeur de données est autorisé à crypter les données en connaissant uniquement l’identité d’un destinataire, tandis que le destinataire doit utiliser à la fois sa clé secrète et un dispositif de sécurité pour obte...
    Disponible

    48,55 €

  • Meccanismo di protezione dei dati migliorato per il cloud storage
    Ateeq-ur Rahman / Mohammed Nadeemuddin
    In questo libro ho introdotto un nuovo meccanismo di protezione dei dati a due fattori per il sistema di cloud storage, in cui il mittente dei dati è autorizzato a crittografare i dati solo con la conoscenza dell’identità del destinatario, mentre quest’ultimo deve utilizzare sia la propria chiave segreta sia un dispositivo di sicurezza per ottenere il diritto di utilizzare i da...
    Disponible

    48,48 €