Sciweavers

5476 search results - page 8 / 1096
» Resettably Secure Computation
Sort
View
INFOCOM
2010
IEEE
15 years 9 days ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
AAAI
2012
13 years 4 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
114
Voted
TEC
2002
166views more  TEC 2002»
15 years 1 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
IEEESP
2010
91views more  IEEESP 2010»
14 years 11 months ago
Security and Privacy Challenges in Cloud Computing Environments
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn