Login / Signup
Secure Execution of Computations in Untrusted Hosts.
Sri Hari Krishna Narayanan
Mahmut T. Kandemir
Richard R. Brooks
Ibrahim Kolcu
Published in:
Ada-Europe (2006)
Keyphrases
</>
sensitive data
third party
privacy preserving
execution model
lightweight
mobile agents
security issues
database
sensor networks
network traffic
data flow
multi party
active databases
security measures