Sciweavers

6137 search results - page 21 / 1228
» Securing Collaborative Applications
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 8 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
COMPSAC
2005
IEEE
14 years 1 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...
ESCIENCE
2006
IEEE
14 years 1 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 11 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
NSPW
2004
ACM
14 years 28 days ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley