Method and apparatus for providing end-to-end privacy for distributed computations

作者: Vesa-Veikko Luukkala , Hannu Ensio Laine , Jukka Honkola , Sergey Boldyrev , Jari Jukka Harald Kaaja

DOI:

关键词:

摘要: An approach is provided for providing end-to-end privacy in multi-level distributed computations. A computation platform determines one or more policies associated with at least level of a computational environment (301). The also closures the (303). further processes and/or facilitates processing and to cause, part, an enforcement (305-315).

参考文章(44)
Sang Yoon Oh, Dong-Myoung Baek, Bhum-Cheol Lee, Jung-Hee Lee, Seung-Woo Lee, Multilayer parallel processing apparatus and method ,(2010)
Richard H. Guski, Carolyn A. Brodie, Peter K. Malkin, John Karat, Clare-Marie N. Karat, Method for mapping privacy policies to classification labels ,(2007)
Roberto Tamassia, Nikos Triandopoulos, Efficient Content Authentication in Peer-to-Peer Networks Applied Cryptography and Network Security. pp. 354- 372 ,(2007) , 10.1007/978-3-540-72738-5_23
Yuecel Karabulut, Murray Spork, Ming-Chien Shan, Composite Application Using Security Annotations ,(2007)
Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter Pietzuch, Brian Shand, Enforcing End-to-End Application Security in the Cloud international middleware conference. pp. 293- 312 ,(2010) , 10.1007/978-3-642-16955-7_15
Ariel Futoransky, Ariel Waissbein, Diego Bartolome Tiscornia, Ezequiel Gutesman, Establishing and enforcing security and privacy policies in web-based applications ,(2005)
Anthony J. Nadalin, Nataraj Nagaratnam, Kathryn H. Britton, Ching-Yun Chao, Timothy J. Hahn, Dieter Buehler, Chunhui Yang, Yi-Hsiu Wei, Role-based access control management for multiple heterogeneous application components ,(2005)