Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing th...
Saved in:
: | |
---|---|
Year of Publication: | 2015 |
Language: | English |
Physical Description: | 1 electronic resource (XIII, 191 p. p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545290104498 |
---|---|
ctrlnum |
(CKB)4920000000102060 (oapen)https://directory.doabooks.org/handle/20.500.12854/43798 (EXLCZ)994920000000102060 |
collection |
bib_alma |
record_format |
marc |
spelling |
Jünemann, Konrad auth Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems Confidential Data-Outsourcing and Self-Optimizing P2P-Networks KIT Scientific Publishing 2015 1 electronic resource (XIII, 191 p. p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation. English Simulation Cloud-Computing Peer-to-Peer Security Data-Outsourcing Sicherheit 3-7315-0328-X |
language |
English |
format |
eBook |
author |
Jünemann, Konrad |
spellingShingle |
Jünemann, Konrad Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
author_facet |
Jünemann, Konrad |
author_variant |
k j kj |
author_sort |
Jünemann, Konrad |
title |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_full |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_fullStr |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_full_unstemmed |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_auth |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_alt |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks |
title_new |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
title_sort |
confidential data-outsourcing and self-optimizing p2p-networks: coping with the challenges of multi-party systems |
publisher |
KIT Scientific Publishing |
publishDate |
2015 |
physical |
1 electronic resource (XIII, 191 p. p.) |
isbn |
1000045068 3-7315-0328-X |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT junemannkonrad confidentialdataoutsourcingandselfoptimizingp2pnetworkscopingwiththechallengesofmultipartysystems AT junemannkonrad confidentialdataoutsourcingandselfoptimizingp2pnetworks |
status_str |
n |
ids_txt_mv |
(CKB)4920000000102060 (oapen)https://directory.doabooks.org/handle/20.500.12854/43798 (EXLCZ)994920000000102060 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems |
_version_ |
1796648820125204481 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01604nam-a2200349z--4500</leader><controlfield tag="001">993545290104498</controlfield><controlfield tag="005">20231214133441.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2015 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000045068</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000000102060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/43798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000000102060</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jünemann, Konrad</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Confidential Data-Outsourcing and Self-Optimizing P2P-Networks</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">KIT Scientific Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (XIII, 191 p. p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud-Computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Peer-to-Peer</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data-Outsourcing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheit</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-7315-0328-X</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:54:26 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337849620004498&Force_direct=true</subfield><subfield code="Z">5337849620004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337849620004498</subfield></datafield></record></collection> |