Sciweavers

2024 search results - page 6 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
ICIP
2009
IEEE
14 years 9 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
CCS
2008
ACM
13 years 10 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
ICALP
2003
Springer
14 years 1 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
ACSAC
1999
IEEE
14 years 27 days ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...