Sciweavers

1286 search results - page 19 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
126
Voted
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 3 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
114
Voted
CONCUR
2005
Springer
15 years 8 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
120
Voted
EUROPAR
2008
Springer
15 years 4 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...
GCC
2003
Springer
15 years 8 months ago
Modelling Cooperative Multi-agent Systems
Cooperative computing is becoming inevitable with the emerging of service-oriented computing and GRID becoming a ubiquitous computing resource. It is widely recognized that agent t...
Lijun Shan, Hong Zhu
114
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 6 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson