Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification.
Oscar G. BautistaKemal AkkayaSoamar HomsiPublished in: LCN (2021)
Keyphrases
- cryptographic protocols
- cloud computing
- sensitive data
- model checking
- information technology
- service providers
- high security
- integrity verification
- third party
- information systems
- security issues
- real world
- face verification
- privacy preserving
- cloud storage
- closed loop
- dynamic model
- private cloud
- business process
- dynamic environments
- formal analysis
- verification method
- supplier selection
- lightweight
- security mechanisms
- formal methods
- security policies
- data center