Filters








45,632 Hits in 3.5 sec

d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds

Rogerio Pontes, Francisco Maia, Ricardo Vilaca, Nuno Machado
2019 2019 38th Symposium on Reliable Distributed Systems (SRDS)  
Privacy sensitive applications that store confidential information such as personal identifiable data or medical records have strict security concerns.  ...  Existing privacy-aware databases mitigate some of these concerns, but sill leak critical information that can potently compromise the entire system's security.  ...  Secure Multi-Party Protocols Secure multi-party protocols enable a set of independent parties to jointly compute any function f on their private inputs without disclosing information besides an agreed  ... 
doi:10.1109/srds47363.2019.00017 dblp:conf/srds/PontesMVM19 fatcat:27hz45xu5rawngi3i725usjolq

Secure Top-k Subgroup Discovery [chapter]

Henrik Grosskreutz, Benedikt Lemmen, Stefan Rüping
2011 Lecture Notes in Computer Science  
Unfortunately, the adaptation of secure multi-party protocols for classical support/confidence association rule mining to the task of subgroup discovery is impossible for fundamental reasons.  ...  The source is the different quality function and the restriction to a fixed number of patterns -i.e. exactly the desired features of subgroup discovery.  ...  Preliminaries In this section, we will briefly go over the most important notions from secure multi-party computation and subgroup discovery.  ... 
doi:10.1007/978-3-642-19896-0_4 fatcat:4s674frggrgktl7qrqfkth2uyy

STAR: Statistical Tests with Auditable Results [article]

Sacha Servan-Schreiber, Olga Ohrimenko, Tim Kraska, Emanuel Zgraggen
2019 arXiv   pre-print
We implement and evaluate a construction of STAR using the Microsoft SEAL encryption library and SPDZ multi-party computation protocol.  ...  by 3rd parties and matches real world trust assumptions.  ...  In STAR we use the SPDZ [14, 34] protocol for evaluating functions in a multi-party setting.  ... 
arXiv:1901.10875v2 fatcat:aqg6ba6mwranfbouf4cxssp66u

Hexa-X: Trustworthy Networking Beyond 5G

Diego López, Carlos J. Bernardos, Bin Han, Cédric Morin, Antonio de la Oliva, Antonio Pastor, Cao-Thanh Phan, Pawani Porambage, Peter Schneider, Hans Dieter Schotten, Elif Ustundag Soykan, Emrah Tomur
2021 Zenodo  
Security also depends on active management of threat surfaces, including proactive measures such as threat prevention and protection as well as reactive measures such as attack discovery and mitigation  ...  Security also depends on active management of threat surfaces, including proactive measures such as threat prevention and protection as well as reactive measures such as attack discovery and mitigation  ...  multi party computations.  ... 
doi:10.5281/zenodo.5589577 fatcat:ug3vssr4y5akde3kumzomienai

Secure Multi-Party Computation for Inter-Organizational Process Mining [article]

Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weildich
2020 arXiv   pre-print
The proposal leverages an existing platform for secure multi-party computation, namely Sharemind.  ...  , in such a way that the parties do not share the event logs with each other.  ...  Secure Multi-Party Computation Secure Multi-party Computation (MPC) [13] is a cryptographic functionality that allows n parties to cooperatively evaluate (y 1 , . . . , y n ) = f (x 1 , . . . , x n )  ... 
arXiv:1912.01855v2 fatcat:hpah7qem5zbc7mow2ouq4ldhfm

3PAC: enforcing access policies for Web services

J. van Bemmel, M. Wegdam, K. Lagerberg
2005 IEEE International Conference on Web Services (ICWS'05)  
Web Services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.  ...  This third party offers service discovery functionality and performs authentication and identity-or role-based access control. It then generates signed credentials for use during service access.  ...  Liberty's ID-WSF Discovery service [8] ) but we limit our discussion to UDDI (in fact our architecture does not depend on the particular discovery protocol used).  ... 
doi:10.1109/icws.2005.2 dblp:conf/icws/BemmelWL05 fatcat:pgefbazhkbgbdi3uc7ji74enbu

Secure Multi-party Computation for Inter-organizational Process Mining [chapter]

Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weidlich
2020 Lecture Notes in Business Information Processing  
The proposal leverages an existing platform for secure multiparty computation, namely Sharemind.  ...  , in such a way that the parties do not share the event logs with each other.  ...  Secure Multi-party Computation Secure Multi-party Computation (MPC) [13] is a cryptographic functionality that allows n parties to cooperatively evaluate (y 1 , . . . , y n ) = f (x 1 , . . . , x n )  ... 
doi:10.1007/978-3-030-49418-6_11 fatcat:uzrgutcm4jhkdbnhtqw2hqcaqe

Resource and service discovery in large-scale multi-domain networks

Reaz Ahmed, Noura Limam, Jin Xiao, Youssef Iraqi, Raouf Boutaba
2007 IEEE Communications Surveys and Tutorials  
Service discovery, as an essential support function of such an infrastructure, is a crucial current research challenge.  ...  With the increasing need for networked applications and distributed resource sharing, there is a strong incentive for an open large-scale service infrastructure operating over multidomain and multi-technology  ...  multi-domain service-discovery infrastructure.  ... 
doi:10.1109/comst.2007.4444748 fatcat:shfbgcgy3bgnfem4iobvs4xdhy

An Architecture for the Semantic Enhancement of Environmental Resources [chapter]

P. Dihé, S. Frysinger, R. Güttler, S. Schlobinski, L. Petronzio, R. Denzer, S. Nešić, T. Lobo, G. Schimak, J. Hřebíček, M. Donatelli
2011 IFIP Advances in Information and Communication Technology  
The objective of the architecture is to seamlessly blend in with existing infrastructures by making use of de facto standards while offering support for discovery, annotation and validation of environmental  ...  Environmental information must be discoverable, and it must be 'understandable' in different contexts in order to be used effectively by parties of various thematic domains.  ...  APIs and standardised web service interfaces) allowing third parties to embed TaToo functionality in their own applications.  ... 
doi:10.1007/978-3-642-22285-6_41 fatcat:lygnkjdljvddbouzkgzrbdejva

On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation

Robin Ankele, Andrew Simpson
2017 2017 IEEE Trustcom/BigDataSE/ICESS  
Generally, such collaborative tasks are referred to as secure multi-party computation (MPC) problems.  ...  We consider both a two-party setting (where we iterate over the number of operations) and a multi-party setting (where we iterate over the number of participants).  ...  Preliminaries Secure Multi-Party Computation The secure multi-party computation problem is defined as follows.  ... 
doi:10.1109/trustcom/bigdatase/icess.2017.361 dblp:conf/trustcom/AnkeleS17 fatcat:ndo26qwfdnh3vlxzfcwt45jszm

Knowledge Federation: A Unified and Hierarchical Privacy-Preserving AI Framework [article]

Hongyu Li, Dan Meng, Hong Wang, Xiaolin Li
2020 arXiv   pre-print
As far as we know, knowledge federation is the first hierarchical and unified framework for secure multi-party computing and learning.  ...  Beyond the concepts of federated learning and secure multi-party computation, KF consists of four levels of federation: (1) information level, low-level statistics and computation of data, meeting the  ...  It is worth noting that they can be applied to other secure multi-party applications such as secure multi-party computation, secure multi-party prediction, and secure multi-party inference.  ... 
arXiv:2002.01647v3 fatcat:g3qnat45onappmzdrvzrfcj3w4

Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility [article]

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 arXiv   pre-print
their functionalities.  ...  A number of proposals to secure ND have been published, but none have analyzed the problem formally.  ...  In the two-party operation the scheme has security weaknesses that the multi-party version is called upon to remedy. In the latter case, our impossibility result does not apply directly.  ... 
arXiv:0808.2668v1 fatcat:4wgcoboh3ve2zhdnhwmyfydtbq

A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation

Bhawani Singh, Anju Singh, Divakar Singh
2015 International Journal of Computer Applications  
Authors displayed it is simple to design and usage depends on the constructions for their two-party state after that design one depends on the multi-party constructions.  ...  Authors explain in details definitions of security, and generic constructions for any two-party and multi-party scenarios.  ... 
doi:10.5120/ijca2015907146 fatcat:cjecbbvnjff43io7zz5adg2by4

Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs)

Konduri. Sucharitha, Dr. R.Latha
2014 IOSR Journal of Computer Engineering  
The main aim behind the developing of ad hoc networking is multi-hop relaying.  ...  For these reasons, securing a mobile ad-hoc network is very challenging in many areas such as routing, bandwidth, security, power consumption, collisions, simulations, and topology control due to moving  ...  The dependence of this protocol on intermediate lower layers for certain functionality presumes that the link status sensing, neighbor discovery, in order packet delivery and address resolution are all  ... 
doi:10.9790/0661-16141217 fatcat:bm76ocsq6jcmjpzju6qxeogpoe

Secure neighbor discovery in wireless networks

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
their functionalities.  ...  A number of proposals to secure ND have been published, but none have analyzed the problem formally.  ...  In the two-party operation the scheme has security weaknesses that the multi-party version is called upon to remedy. In the latter case, our impossibility result does not apply directly.  ... 
doi:10.1145/1368310.1368338 dblp:conf/ccs/PoturalskiPH08 fatcat:4gxlfgcmgbhjvglcwsefp6bgtm
« Previous Showing results 1 — 15 out of 45,632 results