Sciweavers

392 search results - page 9 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 8 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
GIS
2008
ACM
13 years 11 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ESORICS
2008
Springer
14 years 4 days ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
ISPAN
2009
IEEE
14 years 5 months ago
High-Performance Cloud Computing: A View of Scientific Applications
— Scientific computing often requires the availability of a massive number of computers for performing large scale experiments. Traditionally, these needs have been addressed by ...
Christian Vecchiola, Suraj Pandey, Rajkumar Buyya