Sciweavers

836 search results - page 82 / 168
» Privacy and Trust in Distributed Networks
Sort
View
ACSAC
2009
IEEE
14 years 23 days ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
COLCOM
2005
IEEE
14 years 2 months ago
SLACER: randomness to cooperation in peer-to-peer networks
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an...
David Hales, Stefano Arteconi, Özalp Babaoglu
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 9 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
INTERACT
2007
13 years 10 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 2 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal