Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing th...
Sparad:
Huvudskapare: | |
---|---|
Materialtyp: | Elektronisk Bokavsnitt |
Språk: | engelska |
Publicerad: |
KIT Scientific Publishing
2015
|
Ämnen: | |
Länkar: | DOAB: download the publication DOAB: description of the publication |
Taggar: |
Lägg till en tagg
Inga taggar, Lägg till första taggen!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_43798 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2015 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000045068 | ||
020 | |a 9783731503286 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000045068 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Jünemann, Konrad |4 auth | |
245 | 1 | 0 | |a Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
260 | |b KIT Scientific Publishing |c 2015 | ||
300 | |a 1 electronic resource (XIII, 191 p. p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-sa/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-sa/4.0/ | ||
546 | |a English | ||
653 | |a Simulation | ||
653 | |a Cloud-Computing | ||
653 | |a Peer-to-Peer | ||
653 | |a Security | ||
653 | |a Data-Outsourcing | ||
653 | |a Sicherheit | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.ksp.kit.edu/9783731503286 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/43798 |7 0 |z DOAB: description of the publication |