Sciweavers

4111 search results - page 37 / 823
» Security, Protocols, and Trust
Sort
View
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 1 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
TOCS
2002
70views more  TOCS 2002»
13 years 8 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
CORR
2010
Springer
86views Education» more  CORR 2010»
13 years 7 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov
CRITIS
2006
14 years 13 days ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
SRDS
2007
IEEE
14 years 3 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu