期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Software outsourcing risk management: establishing outsourcee evaluation item systems 被引量:1
1
作者 WANG Mei-yuan LU Yao-bin ZHANG Jin-long 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第6期1092-1098,共7页
Outsourcing software development has many advantages as well as inevitable risks. Of these risks, outsourcee se-lection is one of the most important. A wrong outsourcee selection may have severe adverse influence on t... Outsourcing software development has many advantages as well as inevitable risks. Of these risks, outsourcee se-lection is one of the most important. A wrong outsourcee selection may have severe adverse influence on the expected outcome of the project. We analyzed the risks involved in outsourcee selection and also provided methods to identify these risks. Using the principles of Analytical Hierarchy Process (AHP) and Cluster Analysis based on Group Decision Making, we established an index evaluation system to evaluate and select outsourcees. Real world applications of this system demonstrated its effectiveness in evaluating and selecting qualified outsourcees. 展开更多
关键词 Software outsourcing outsourcee evaluation Group decision making
在线阅读 下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
2
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--Cloud database data anonymity database privacy outsource database REVERSIBLE
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部