Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants.
Bradley A. MalinEdoardo M. AiroldiSamuel Edoho-EketYiheng LiPublished in: ICDE (2005)
Keyphrases
- multi party
- security protocols
- data analysis
- privacy preserving
- automated design
- security properties
- artificial immune algorithm
- security services
- key management
- security mechanisms
- authentication protocol
- data mining
- description language
- mental states
- security requirements
- rfid tags
- data warehouse
- data processing
- fair exchange