From professional translators, enterprises, web pages and freely available translation repositories.
retrieving messages
import...
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving new messages
retrieving new messages
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving message status
retrieving message status
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error retrieving user permissions.
error retrieving user permissions.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error while retrieving messages.
error while retrieving messages.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error while retrieving messages from the server.
error while retrieving messages from the server.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving list of outstanding bugs for product '% 1'...
retrieving list of outstanding bugs for product '%1 '...
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error while retrieving information on the structure of a message.
error while retrieving information on the structure of a message.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error retrieving access control list (acl) from server% 1
error retrieving access control list (acl) from server %1
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving list of outstanding bugs for product '% 1' (component% 2)...
retrieving list of outstanding bugs for product '%1 '(component %2)...
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
error retrieving access control list (acl) from server% 1the audit log is a detailed error log from the gnupg backend
error retrieving audit log: %1
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
while retrieving information about the specified proxy host,% 1, an unknown host error was encountered. an unknown host error indicates that the requested name could not be located on the internet.
while retrieving information about the specified proxy host, %1, an unknown host error was encountered. an unknown host error indicates that the requested name could not be located on the internet.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
'to yahooin cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. however, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information, identity privacy to public verifiers. this paper proposes a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. it particularly exploits ring signatures to compute verification metadata needed to audit the correctness of shared data. with this mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. in addition, this mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. the experimental results demonstrate the effectiveness and efficiency of the mechanism when auditing shared data integrity.
yahooin cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. however, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information, identity privacy to public verifiers. this paper proposes a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. it particularly exploits ring signatures to compute verification metadata needed to audit the correctness of shared data. with this mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. in addition, this mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. the experimental results demonstrate the effectiveness and efficiency of the mechanism when auditing shared data integrity.
Last Update: 2014-11-28
Usage Frequency: 1
Quality:
Reference: