Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Exploiting data sensitivity on partitioned data
Sharad Mehrotra
, Kerim Yasin Oktay
,
Shantanu Sharma
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
4
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Exploiting data sensitivity on partitioned data'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Public Cloud
100%
Partitioned Data
100%
Data Sensitivity
100%
Encryption
33%
Private Cloud
33%
Hybrid Cloud
33%
Information Leakage
33%
Non-sensitive
33%
Computational Complexity
16%
Vulnerability
16%
Data Access
16%
Computational Platform
16%
Cloud-based
16%
Query Processing
16%
Processing Cost
16%
Cloud Resources
16%
Computing Approach
16%
Enterprise Data
16%
Frequency Count
16%
Inter-cloud
16%
Local Resources
16%
Selection Queries
16%
Secure Storage
16%
Cloud Data
16%
Size Frequency
16%
Security Criteria
16%
Encrypted Computing
16%
Storage Platform
16%
Secure Data Processing
16%
Secret Sharing
16%
Non-sensitive Data
16%
Non-sensitivity
16%
Secure Data Outsourcing
16%
Support Selection
16%
Secure Solution
16%
Trusted Hardware
16%
Trusted Server
16%
Cryptographic Approach
16%
Computer Science
Public Cloud
100%
Partitioned Data
100%
Data Processing
33%
Private Cloud
33%
Hybrid Cloud
33%
Information Leakage
33%
Encrypted Data
16%
Computational Complexity
16%
Query Processing
16%
Data Access
16%
Secret Sharing
16%
Processing Cost
16%
Security Criterion
16%
Enterprise Data
16%