Sciweavers

4 search results - page 1 / 1
» Private Computing with Beehive Organized Agents
Sort
View
SECRYPT
2007
82views Business» more  SECRYPT 2007»
14 years 9 days ago
Private Computing with Beehive Organized Agents
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin va...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 10 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
IJWIS
2007
153views more  IJWIS 2007»
13 years 10 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 1 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...