Sciweavers

3299 search results - page 73 / 660
» Privacy and Trusted Computing
Sort
View
CSREASAM
2006
13 years 10 months ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...
TKDE
2012
215views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
ACSW
2006
13 years 10 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
14 years 3 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ESORICS
2010
Springer
13 years 10 months ago
Optimistic Fair Exchange with Multiple Arbiters
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has something that Bob wants, and Bob has something that Alice wants. A fair exchang...
Alptekin Küpçü, Anna Lysyanskaya