Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing th...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_43798 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2015 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000045068 | ||
020 | |a 9783731503286 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000045068 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Jünemann, Konrad |4 auth | |
245 | 1 | 0 | |a Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
260 | |b KIT Scientific Publishing |c 2015 | ||
300 | |a 1 electronic resource (XIII, 191 p. p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-sa/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-sa/4.0/ | ||
546 | |a English | ||
653 | |a Simulation | ||
653 | |a Cloud-Computing | ||
653 | |a Peer-to-Peer | ||
653 | |a Security | ||
653 | |a Data-Outsourcing | ||
653 | |a Sicherheit | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.ksp.kit.edu/9783731503286 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/43798 |7 0 |z DOAB: description of the publication |