Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2014

Data

Discipline
Institution
Publication
Publication Type

Articles 31 - 39 of 39

Full-Text Articles in Social and Behavioral Sciences

Multi-Phase Ant Colony System For Multi-Party Data-Intensive Service Provision, Lijuan Wang, Jun Shen Jan 2014

Multi-Phase Ant Colony System For Multi-Party Data-Intensive Service Provision, Lijuan Wang, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

The rapid proliferation of enormous sources of digital data has led to greater dependence on data-intensive services. Each service may actually request or create a large amount of data sets. To compose these services will be more challenging. Issues such as autonomy, scalability, adaptability, and robustness, become difficult to resolve. In order to automate the process of reaching an agreement among service composers, service providers, and data providers, an ant-inspired negotiation mechanism is considered in this paper. We exploit a group of agents automatically negotiating to establish agreeable service contracts. Twostage negotiation procedures are used in our data-intensive service provision …


Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong Jan 2014

Enhanced Privacy Of A Remote Data Integrity-Checking Protocol For Secure Cloud Storage, Yong Yu, Man Ho Au, Yi Mu, S Tang, J Ren, Willy Susilo, Liju Dong

Faculty of Engineering and Information Sciences - Papers: Part A

Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on publicly available information. To capture the need of data privacy against an untrusted auditor, Hao et al. formally defined "privacy against third party verifiers" as one of the security requirements and proposed a protocol satisfying this definition. However, we observe that all existing protocols with public verifiability supporting data update, …


A Review Of Data Quality Assessment Methods For Public Health Information Systems, Hong Chen, David Hailey, Ning Wang, Ping Yu Jan 2014

A Review Of Data Quality Assessment Methods For Public Health Information Systems, Hong Chen, David Hailey, Ning Wang, Ping Yu

Faculty of Engineering and Information Sciences - Papers: Part A

High quality data and effective data quality assessment are required for accurately evaluating the impact of public health interventions and measuring public health outcomes. Data, data use, and data collection process, as the three dimensions of data quality, all need to be assessed for overall data quality assessment. We reviewed current data quality assessment methods. The relevant study was identified in major databases and well-known institutional websites. We found the dimension of data was most frequently assessed. Completeness, accuracy, and timeliness were the three most-used attributes among a total of 49 attributes of data quality. The major quantitative assessment methods …


Attribute-Based Data Transfer With Filtering Scheme In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2014

Attribute-Based Data Transfer With Filtering Scheme In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Engineering and Information Sciences - Papers: Part A

Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Unfortunately, there exist some drawbacks in the current DTSs. First, the sender must know who the real receivers are. This is undesirable in a system where the number of the users is very large, such as …


Ant-Inspired Multi-Phase And Multi-Party Negotiations In The Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Qingguo Zhou, Ghassan Beydoun Jan 2014

Ant-Inspired Multi-Phase And Multi-Party Negotiations In The Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Qingguo Zhou, Ghassan Beydoun

Faculty of Engineering and Information Sciences - Papers: Part A

The rapid proliferation of enormous sources of digital data and the development of cloud computing have led to greater dependence on data-intensive services. Each service may actually request or create a large amount of data sets. To compose these services will be more challenging. Issues of autonomy, scalability, adaptability, and robustness, become difficult to resolve. In order to automate the process of reaching an agreement in data-intensive service provision, the ant-inspired negotiation mechanism is considered in this paper. There are twostage negotiation procedures in our model, which will provide effective and efficient service selection for service composers. We also present …


An Adaptively Cca-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption For Cloud Data Sharing, Kaitai Liang, Man Ho Au, Willy Susilo, Duncan Wong, Guomin Yang, Yong Yu Jan 2014

An Adaptively Cca-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption For Cloud Data Sharing, Kaitai Liang, Man Ho Au, Willy Susilo, Duncan Wong, Guomin Yang, Yong Yu

Faculty of Engineering and Information Sciences - Papers: Part A

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) employs the PRE technology in the attribute-based en- cryption cryptographic setting, in which the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many real world applications, such as network data sharing. The existing CP-ABPRE systems, how- ever, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the rst time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. The new scheme supports any …


Pliocene To Pleistocene Climate And Environmental History Of Lake El'gygytgyn, Far East Russian Arctic, Based On High-Resolution Inorganic Geochemistry Data, V Wennrich, P S. Minyuk, V Borkhodoev, Alexander Francke, B Ritter, Norbert R. Nowaczyk, M A. Sauerbrey, J Brigham-Grette, Martin Melles Jan 2014

Pliocene To Pleistocene Climate And Environmental History Of Lake El'gygytgyn, Far East Russian Arctic, Based On High-Resolution Inorganic Geochemistry Data, V Wennrich, P S. Minyuk, V Borkhodoev, Alexander Francke, B Ritter, Norbert R. Nowaczyk, M A. Sauerbrey, J Brigham-Grette, Martin Melles

Faculty of Science, Medicine and Health - Papers: part A

The 3.6 Ma sediment record of Lake El'gygytgyn/NE Russia, Far East Russian Arctic, represents the longest continuous climate archive of the terrestrial Arctic. Its elemental composition as determined by X-ray fluorescence scanning exhibits significant changes since the mid-Pliocene caused by climate-driven variations in primary production, postdepositional diagenetic processes, and lake circulation as well as weathering processes in its catchment. During the mid- to late Pliocene, warmer and wetter climatic conditions are reflected by elevated Si / Ti ratios, indicating enhanced diatom production in the lake. Prior to 3.3 Ma, this signal is overprinted by intensified detrital input from the catchment, …


Data And Resources For A Whole Community Approach To Emergency Planning, Meg A. Traci Ph.D., University Of Montana Rural Institute Jan 2014

Data And Resources For A Whole Community Approach To Emergency Planning, Meg A. Traci Ph.D., University Of Montana Rural Institute

Employment

No abstract provided.


A History Of Financial Regulation In The Usa From The Beginning Until Today: 1789 To 2011, Gary Richardson Dec 2013

A History Of Financial Regulation In The Usa From The Beginning Until Today: 1789 To 2011, Gary Richardson

Gary Richardson

No abstract provided.