Sciweavers

162 search results - page 9 / 33
» Outsourcing Multi-Party Computation
Sort
View
CCS
2007
ACM
15 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
77
Voted
SAC
2009
ACM
15 years 4 months ago
Constructing process views for service outsourcing
Rik Eshuis, Alex Norta
PET
2004
Springer
15 years 2 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
GI
2003
Springer
15 years 2 months ago
Outsourcing unter Sicherheitsaspekten - wie kann das aussehen?
: Outsourcing gewinnt im Rahmen der Verschlankung von Behörden und Unternehmen und der Konzentration auf Kernkompetenzen an Bedeutung. Sicherheitsgesichtspunkte werden dabei leide...
Michael Mehrhoff, Isabel Münch