Owner Secured Data Storage on Cloud and Sharing with Key Aggregate System

In this paper, the authors study how to securely and efficiently, also flexibly share data with others over cloud storage. Now-a-days, data sharing is in very large scale. Also outsourcing of data is big data. They introduce new public-key crypto-systems which produce constant size cipher texts that efficiently representative for decryption rights for any set of cipher texts are possible. The aggregate key is combination of any set of secret keys and single key, but encompassing the power of all the keys being aggregated.

Spotlight

Excelian

Excelian was founded in 2001 in order to meet the market demand for a company that would ‘go the extra mile’ to provide technical application and business expertise to the financial services and commodities industry. From the outset, Excelian sought to be known for its excellence: we offered the unique and valuable combination of strong business knowledge, profound understanding of package solutions, in particular Murex, Calypso and Openlink, and high-level technical expertise – all delivered professionally and ethically alongside a top-quality consultative service.

OTHER WHITEPAPERS
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More

Spotlight

Excelian

Excelian was founded in 2001 in order to meet the market demand for a company that would ‘go the extra mile’ to provide technical application and business expertise to the financial services and commodities industry. From the outset, Excelian sought to be known for its excellence: we offered the unique and valuable combination of strong business knowledge, profound understanding of package solutions, in particular Murex, Calypso and Openlink, and high-level technical expertise – all delivered professionally and ethically alongside a top-quality consultative service.

Events