O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Protecting Data in Outsourcing Scenarios

Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati

14.1 Introduction

The rapid advancements in Information and Communication Technologies (ICTs) have brought the development of new computing paradigms, where the techniques for processing, storing, communicating, sharing, and disseminating information have radically changed. Individuals and organizations are more and more resorting to external servers [1] for the storage and the efficient and reliable dissemination of information. The main consequence of this trend is the development of a data outsourcing architecture on a wide scale. Although data outsourcing introduces many benefits in terms of management and availability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required