2016
DOI: 10.1016/j.knosys.2016.07.017
|View full text |Cite
|
Sign up to set email alerts
|

An efficient subscription index for publication matching in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Meanwhile, our scheme can be applied to almost all kinds of barrage sentiment analysis with good universality. In additon, the data analysis method proposed in this paper may be used in many scenarios, such as cloud computing [35], publish/subscribe [36], movies reviews [37], data query [38], etc.…”
Section: E Various Kinds Of Barragesmentioning
confidence: 99%
“…Meanwhile, our scheme can be applied to almost all kinds of barrage sentiment analysis with good universality. In additon, the data analysis method proposed in this paper may be used in many scenarios, such as cloud computing [35], publish/subscribe [36], movies reviews [37], data query [38], etc.…”
Section: E Various Kinds Of Barragesmentioning
confidence: 99%
“…Since there may be a large number of relevant datasheets, a simple exploration operation cannot efficiently obtain the information for a user's needs. The approach to large-scale social searching is to gather relevant information together and construct a globle search index [7]. Due to the aforementioned user privacy concerns, it is difficult to construct a keyword search for OSN.…”
Section: Introductionmentioning
confidence: 99%
“…In a cloud computing environment, the archives of an organization are not stored on a trusted local server but are stored and managed by the cloud server, resulting in each archive and its owner being separated from each other, i.e., making each archive in an uncontrollable area, and in turn posing a serious threat to the security of archival materials [13][14][15]. Such security threat mainly includes two aspects: (1) external threat, i.e., hackers' attack on the cloud service provider (which has been verified by endless hacking incidents) [16]; and (2) internal threat, i.e., inside jobs from workers of the cloud service provider (driven by interests, it is possible for management workers to maliciously stealing sensitive archival information) [17]. In a word, the security issue of archives on the cloud (i.e., how to ensure the security of sensitive archival data on the untrusted cloud) has become one of the main obstacles to restricting the management of archives on the cloud, which has attracted more and more attention.…”
Section: Introductionmentioning
confidence: 99%