Sciweavers

2927 search results - page 29 / 586
» Secure Distributed Human Computation
Sort
View
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 8 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
INTELLCOMM
2004
Springer
14 years 1 months ago
Triple-Space Computing: Semantic Web Services Based on Persistent Publication of Information
This paper discusses possible routes to moving the web from a collection of human readable pieces of information connecting humans, to a web that connects computing devices based o...
Dieter Fensel
CHIMIT
2008
ACM
13 years 9 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 1 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...