Login / Signup
A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data.
Yan-Bo Han
Jun-Yi Sun
Gui-Ling Wang
Hou-Fu Li
Published in:
J. Comput. Sci. Technol. (2010)
Keyphrases
</>
sensitive data
compute intensive
malicious users
privacy preserving
end users
sensitive information
databases
smart card
information security
computing platform
third party
management system
real world
data access
data storage
privacy protection
data model
computer architecture
user interface
data mining