Login / Signup

Secure Execution of Computations in Untrusted Hosts.

Sri Hari Krishna NarayananMahmut T. KandemirRichard R. BrooksIbrahim Kolcu
Published in: Ada-Europe (2006)
Keyphrases
  • sensitive data
  • third party
  • privacy preserving
  • execution model
  • lightweight
  • mobile agents
  • security issues
  • database
  • sensor networks
  • network traffic
  • data flow
  • multi party
  • active databases
  • security measures