27,188 research outputs found
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption
Cloud computing is a revolutionary computing paradigm which enables flexible,
on-demand and low-cost usage of computing resources. However, those advantages,
ironically, are the causes of security and privacy problems, which emerge
because the data owned by different users are stored in some cloud servers
instead of under their own control. To deal with security problems, various
schemes based on the Attribute- Based Encryption (ABE) have been proposed
recently. However, the privacy problem of cloud computing is yet to be solved.
This paper presents an anonymous privilege control scheme AnonyControl to
address the user and data privacy problem in a cloud. By using multiple
authorities in cloud computing system, our proposed scheme achieves anonymous
cloud data access, finegrained privilege control, and more importantly,
tolerance to up to (N -2) authority compromise. Our security and performance
analysis show that AnonyControl is both secure and efficient for cloud
computing environment.Comment: 9 pages, 6 figures, 3 tables, conference, IEEE INFOCOM 201
Thrust distribution in Higgs decays at the next-to-leading order and beyond
We present predictions for the thrust distribution in hadronic decays of the
Higgs boson at the next-to-leading order and the approximate
next-to-next-to-leading order. The approximate NNLO corrections are derived
from a factorization formula in the soft/collinear phase-space regions. We find
large corrections, especially for the gluon channel. The scale variations at
the lowest orders tend to underestimate the genuine higher order contributions.
The results of this paper is therefore necessary to control the perturbative
uncertainties of the theoretical predictions. We also discuss on possible
improvements to our results, such as a soft-gluon resummation for the 2-jets
limit, and an exact next-to-next-to-leading order calculation for the
multi-jets region
- …