LEADER 01757nam 2200373z- 450 001 9910347045603321 005 20231214133441.0 010 $a1000045068 035 $a(CKB)4920000000102060 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/43798 035 $a(EXLCZ)994920000000102060 100 $a20202102d2015 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aConfidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems 210 $cKIT Scientific Publishing$d2015 215 $a1 electronic resource (XIII, 191 p. p.) 311 $a3-7315-0328-X 330 $aThis work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation. 517 $aConfidential Data-Outsourcing and Self-Optimizing P2P-Networks 610 $aSimulation 610 $aCloud-Computing 610 $aPeer-to-Peer 610 $aSecurity 610 $aData-Outsourcing 610 $aSicherheit 700 $aJünemann$b Konrad$4auth$01314089 906 $aBOOK 912 $a9910347045603321 996 $aConfidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems$93031689 997 $aUNINA