Sciweavers

3299 search results - page 41 / 660
» Privacy and Trusted Computing
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
EUROCRYPT
2006
Springer
14 years 11 days ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
TSC
2008
112views more  TSC 2008»
13 years 8 months ago
A Privacy Preserving Repository for Data Integration across Data Sharing Services
Current data sharing and integration among various organizations require a central and trusted authority to collect data from all data sources and then integrate the collected data...
Stephen S. Yau, Yin Yin
ICDCIT
2004
Springer
14 years 2 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
FOSAD
2005
Springer
14 years 2 months ago
Security and Trust Requirements Engineering
Paolo Giorgini, Fabio Massacci, Nicola Zannone