Sciweavers

1286 search results - page 64 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 7 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 3 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
WETICE
2006
IEEE
15 years 9 months ago
A Model-Driven Framework for Managing the QoS of Collaborative P2P Service-Based Applications
1 Distributed and collaborative applications are rapidly converging towards the adoption of a computing paradigm based on service-oriented architectures, according to which an appl...
Michele Angelaccio, Andrea D'Ambrogio
ICDCIT
2004
Springer
15 years 8 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
SAC
2006
ACM
15 years 9 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya