Data in the Cloud: Authentication Without Leaking

Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

Provided by: SecurityTube.net Topic: Cloud Date Added: Jan 2014 Format: Webcast

Find By Topic