2,884 research outputs found

    PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

    Get PDF
    Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users’ privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, users’ privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments

    Outsourcing Back Office Services in Small Nonprofits: Pitfalls and Possibilities

    Get PDF
    Presents findings on small nonprofits' administrative, finance, and other office support needs; reasons and conditions for outsourcing as well as barriers; methods for evaluating options; and guiding principles. Examines three business models

    An empirical investigation of IT outsourcing vs. quasi-outsourcing in France and Germany

    No full text
    An increasingly large number of firms outsource their information technology (IT). Firms that contemplate such outsourcing have two alternatives: (1) a contract with a vendor (i.e., outsourcing) or (2) setting up their own IT subsidiary (i.e., quasi-outsourcing). This study examines some of the determinants of the outsourcing versus quasi-outsourcing decision. Using primary data collected in France and Germany, we show that the decision is strongly influenced by both internal (i.e., asset-specificity, size, and internal organization of IT) and external (i.e., institutional environment) determinants

    Marines vs. Contractors: an analysis of a supply outsourcing initiative and its impact on cost and efficiency

    Get PDF
    Since 2001, the Marine Corps has outsourced the management of all individual issue combat gear. This contracted outsourcing, called the Consolidated Issue Facility (CIF) and then the Individual Issue Facility (IIF) under the direction of local Marine Expeditionary Force Headquarters (MEF HQ) and Marine Corps Logistics Command (LOGCOM), are responsible for the distribution, management, and collection of every Marine's individual combat issue of gear; a task previously accomplished by each unit's individual organic supply section. By removing this burden on the supply sections, the Marine Corps was theoretically able to free-up Marines to fill billets in warfighting roles. The Marine Corps has touted the ability to save money and create efficiencies that did not exist previously with organic Marine Corps led supply operations. The Marine Corps is looking to increase the amount of assets managed by an outside vendor, by outsourcing management of unit assets such as Soft Walled Shelters and Camouflage netting to a Unit Issue Facility (UIF) using the same model as the CIF/IIF. This paper will explore if the CIF/IIF program saved the Marine Corps money from 2001 thru 2010, allowed for transfer of personnel to other roles, and if the program is an effective model for future outsourcing endeavors.http://archive.org/details/marinesvscontrac1094510592US Marine Corps (USMC) author

    Information Technology Sourcing Research: Critique, Lessons and Prospects

    Get PDF
    F1 - Full Written Papers Referee
    • …
    corecore