Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems

This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing th...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2015
Language:English
Physical Description:1 electronic resource (XIII, 191 p. p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545290104498
ctrlnum (CKB)4920000000102060
(oapen)https://directory.doabooks.org/handle/20.500.12854/43798
(EXLCZ)994920000000102060
collection bib_alma
record_format marc
spelling Jünemann, Konrad auth
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks
KIT Scientific Publishing 2015
1 electronic resource (XIII, 191 p. p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.
English
Simulation
Cloud-Computing
Peer-to-Peer
Security
Data-Outsourcing
Sicherheit
3-7315-0328-X
language English
format eBook
author Jünemann, Konrad
spellingShingle Jünemann, Konrad
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
author_facet Jünemann, Konrad
author_variant k j kj
author_sort Jünemann, Konrad
title Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_full Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_fullStr Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_full_unstemmed Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_auth Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_alt Confidential Data-Outsourcing and Self-Optimizing P2P-Networks
title_new Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
title_sort confidential data-outsourcing and self-optimizing p2p-networks: coping with the challenges of multi-party systems
publisher KIT Scientific Publishing
publishDate 2015
physical 1 electronic resource (XIII, 191 p. p.)
isbn 1000045068
3-7315-0328-X
illustrated Not Illustrated
work_keys_str_mv AT junemannkonrad confidentialdataoutsourcingandselfoptimizingp2pnetworkscopingwiththechallengesofmultipartysystems
AT junemannkonrad confidentialdataoutsourcingandselfoptimizingp2pnetworks
status_str n
ids_txt_mv (CKB)4920000000102060
(oapen)https://directory.doabooks.org/handle/20.500.12854/43798
(EXLCZ)994920000000102060
carrierType_str_mv cr
is_hierarchy_title Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
_version_ 1796648820125204481
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01604nam-a2200349z--4500</leader><controlfield tag="001">993545290104498</controlfield><controlfield tag="005">20231214133441.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2015 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000045068</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000000102060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/43798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000000102060</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jünemann, Konrad</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Confidential Data-Outsourcing and Self-Optimizing P2P-Networks</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">KIT Scientific Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (XIII, 191 p. p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud-Computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Peer-to-Peer</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data-Outsourcing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheit</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-7315-0328-X</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:54:26 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337849620004498&amp;Force_direct=true</subfield><subfield code="Z">5337849620004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337849620004498</subfield></datafield></record></collection>