Sciweavers

3299 search results - page 121 / 660
» Privacy and Trusted Computing
Sort
View
CCS
2000
ACM
15 years 9 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
143
Voted
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 5 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
141
Voted
IACR
2011
104views more  IACR 2011»
14 years 4 months ago
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit o...
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, ...
173
Voted
ICISC
2004
173views Cryptology» more  ICISC 2004»
15 years 6 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
POLICY
2005
Springer
15 years 10 months ago
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and accesscontrol relat...
Piero A. Bonatti, Daniel Olmedilla