Sciweavers

2358 search results - page 122 / 472
» A Secure Pervasive Environment
Sort
View
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 9 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
CCGRID
2006
IEEE
14 years 3 months ago
Nova: An Approach to On-Demand Virtual Execution Environments for Grids
This paper attempts to reduce the overheads of dynamically creating and destroying the virtual environments for secure job execution. It broaches a grid architecture which we call...
Srikanth Sundarrajan, Hariprasad Nellitheertha, Su...
IADIS
2003
13 years 10 months ago
On the Use of PKI in a Residential Gateway Environment
The Residential Gateway poses numerous privacy challenges insofar as it involves a great increase in the amount of personal information exposed to a public network. In this short ...
Boaz Gelbord, Geert Kleinhuis
ECOOPW
1999
Springer
14 years 1 months ago
Security Properties of Typed Applets
This paper formalizes the folklore result that strongly-typed applets are more secure than untyped ones. We formulate and prove several security properties that all well-typed app...
Xavier Leroy, François Rouaix