Sciweavers

703 search results - page 141 / 141
» A Framework for Outsourcing of Secure Computation
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 3 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JAMIA
2010
115views more  JAMIA 2010»
12 years 10 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
IWQOS
2011
Springer
12 years 6 months ago
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Abstract—Cloud systems provide a cost-effective service hosting infrastructure for application service providers (ASPs). However, cloud systems are often shared by multiple tenan...
Juan Du, Xiaohui Gu, Nidhi Shah