Rural smart tourism under the background of internet plus

W Zhu, F Shang - Ecological Informatics, 2021 - Elsevier
Rural tourism under the background of internet plus needs to improve the tourism model and
improve the modernization process of rural tourism. In order to improve the efficiency of rural …

Secure disintegration protocol for privacy preserving cloud storage

BS Rawal, V Vijayakumar, G Manogaran… - Wireless personal …, 2018 - Springer
Cloud service providers offer infrastructure, network services, and software applications in
the cloud. The cloud services are hosted in a data center that can be used by users with the …

Secure cloud storage and file sharing

BS Rawal, SS Vivek - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Internet-based online cloud services provide enormous volumes of storage space, tailor
made computing resources and eradicates the obligation of native machines for data …

Usability and security go together: A case study on database

Y Wang, B Rawal, Q Duan… - 2017 Second International …, 2017 - ieeexplore.ieee.org
In this paper, we review security and usability scenarios. We propose security enhancement
without losing usability. We apply this approach to popular application systems in the …

Proxy re-encryption architect for storing and sharing of cloud contents

BS Rawal - International Journal of Parallel, Emergent and …, 2020 - Taylor & Francis
Internet-based online cloud services provide enormous volumes of storage space, tailor-
made computing resources and eradicate the obligation of native machines for data …

Securing big data in the cloud with integrated auditing

Y Wang, B Rawal, Q Duan - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In this paper, we review big data characteristics and security challenges in the cloud and
visit different cloud domains and security regulations. We propose using integrated auditing …

Enabling the evolution of J2EE applications through reverse engineering and quality assurance

F Perin - 2009 16th Working Conference on Reverse …, 2009 - ieeexplore.ieee.org
Enterprise Applications are complex software systems that manipulate much persistent data
and interact with the user through a vast and complex user interface. In particular …

Develop ten security analytics metrics for big data on the cloud

Y Wang, BS Rawal, Q Duan - Advances in Data Sciences, Security and …, 2020 - Springer
This paper reviews big data security analytics and looks into the big data lifecycle for
assessments of big data security challenge in clouds. The paper justifies the reasons to …

[PDF][PDF] Usability meets security: a database case study

Y Wang, BS Rawal - Journal of Advanced Computer Science & …, 2017 - researchgate.net
Abstract In this paper, we review security and usability scenarios. We propose security
enhancements without losing usability and apply a new approach to popular application …

[引用][C] Enhance big data security in cloud using access control

Y Wang, P Zhang - Int'l Conf. on Advances in Big Data Analytics, 2017