Sciweavers

5476 search results - page 149 / 1096
» Resettably Secure Computation
Sort
View
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
15 years 5 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
WIMOB
2008
IEEE
15 years 10 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
ESCIENCE
2005
IEEE
15 years 10 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
APSEC
2003
IEEE
15 years 9 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin