Sciweavers

739 search results - page 38 / 148
» Security Challenges in Cloud Computing
Sort
View
JSW
2008
89views more  JSW 2008»
15 years 4 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
135
Voted
ICSE
2003
IEEE-ACM
16 years 4 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 2 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya
CROSSROADS
2010
14 years 11 months ago
Massive multiplayer human computation for fun, money, and survival
Crowdsourcing is an effective tool to solve hard tasks. By bringing 100,000s of people to work on simple tasks that only humans can do, we can go far beyond traditional models of ...
Lukas Biewald
CCS
2008
ACM
15 years 6 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal