Sciweavers

5476 search results - page 8 / 1096
» Resettably Secure Computation
Sort
View
INFOCOM
2010
IEEE
15 years 1 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
AAAI
2012
13 years 5 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
90
Voted
IEEESP
2010
91views more  IEEESP 2010»
15 years 21 days ago
Security and Privacy Challenges in Cloud Computing Environments
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn