Search
Now showing items 1-6 of 6
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
(
World Scientific Publishing Co. Pte Ltd
, 2016 , Article)
In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
Automatic generation of optimized workflow for distributed computations on large-scale matrices
(
Springer Verlag
, 2014 , Conference Paper)
Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
Paillier's encryption: Implementation and cloud applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
A model driven framework for secure outsourcing of computation to the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...