메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-10

Security against the business partner

Author keywords

Secure multi party computation; Secure permutation; Security against the business partner

Indexed keywords

BUSINESS PARTNERS; INSIDER THREAT; NETWORKED BUSINESS; POSSIBLE SOLUTIONS; PRACTICAL REALIZATIONS; SECURE MULTI-PARTY COMPUTATION; SECURE PERMUTATION; SECURITY AGAINST THE BUSINESS PARTNER; SECURITY RESEARCH; SUPPLY CHAIN OPTIMIZATION; THEORETICAL COMPLEXITY;

EID: 70349243955     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456492.1456493     Document Type: Conference Paper
Times cited : (10)

References (29)
  • 2
    • 84898960610 scopus 로고    scopus 로고
    • Ben-Or, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
    • Ben-Or, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
  • 3
    • 70349256822 scopus 로고    scopus 로고
    • BOGETOFT, P., CHRISTENSEN, D., DAMGARD, I., GEISLER, M., JAKOBSEN, T., KROIGAARD, M., NIELSEN, J., NIELSEN, J., NIELSEN, K., PAGTER, J., SCHWARTZBACH, M., AND TOFT., T. Multiparty Computation Goes Live. Available at http://eprint.iacr.org/2008/ 068, 2008.
    • BOGETOFT, P., CHRISTENSEN, D., DAMGARD, I., GEISLER, M., JAKOBSEN, T., KROIGAARD, M., NIELSEN, J., NIELSEN, J., NIELSEN, K., PAGTER, J., SCHWARTZBACH, M., AND TOFT., T. Multiparty Computation Goes Live. Available at http://eprint.iacr.org/2008/ 068, 2008.
  • 5
    • 0038687775 scopus 로고    scopus 로고
    • CAMENISCH, J., AND VAN HERREWEGHEN, E. Design and Implementation of the idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
    • CAMENISCH, J., AND VAN HERREWEGHEN, E. Design and Implementation of the idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
  • 6
    • 0000879068 scopus 로고
    • Optimal policies for a multi-echelon inventory problem
    • CLARK, A., AND SCARF, H. Optimal policies for a multi-echelon inventory problem. Management Science 6(4), 1960.
    • (1960) Management Science , vol.6 , Issue.4
    • CLARK, A.1    SCARF, H.2
  • 7
    • 70349230419 scopus 로고    scopus 로고
    • CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. Multiparty computation from threshold homomorphic encryption. In Proceedings of Eurocrypt, 2001.
    • CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. Multiparty computation from threshold homomorphic encryption. In Proceedings of Eurocrypt, 2001.
  • 8
    • 70349238232 scopus 로고    scopus 로고
    • DAMGARD, I., AND JURIK, M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, 2001.
    • DAMGARD, I., AND JURIK, M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, 2001.
  • 13
    • 70349250814 scopus 로고    scopus 로고
    • IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See, 2006
    • IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See http://ibm.com/db2/eas/, 2006.
  • 15
    • 47949114798 scopus 로고    scopus 로고
    • KERSCHBAUM, F. Building A Privacy-Preserving Benchmarking Enterprise System. In Proceedings of the 11th IEEE International EDOC Conference, 2007.
    • KERSCHBAUM, F. Building A Privacy-Preserving Benchmarking Enterprise System. In Proceedings of the 11th IEEE International EDOC Conference, 2007.
  • 16
    • 77954697808 scopus 로고    scopus 로고
    • KERSCHBAUM, F. Distance-Preserving Pseudonymization for Timestamps and Spatial Data. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007.
    • KERSCHBAUM, F. Distance-Preserving Pseudonymization for Timestamps and Spatial Data. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007.
  • 17
    • 48249134708 scopus 로고    scopus 로고
    • KERSCHBAUM, F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference, 2008.
    • KERSCHBAUM, F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference, 2008.
  • 18
    • 70349234974 scopus 로고    scopus 로고
    • An Experimental Study on the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols
    • KERSCHBAUM, F., DAHLMEIER, D., SCHRÖPFER, A., AND BISWAS, D. An Experimental Study on the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. SAP Internal Technical Report, 2008.
    • (2008) SAP Internal Technical Report
    • KERSCHBAUM, F.1    DAHLMEIER, D.2    SCHRÖPFER, A.3    BISWAS, D.4
  • 19
    • 70349248951 scopus 로고    scopus 로고
    • KERSCHBAUM, F., HALLER, J., KARABULUT, Y., AND ROBINSON, P. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In Proceedings of the 4th International Conference on Trust Management, 2006.
    • KERSCHBAUM, F., HALLER, J., KARABULUT, Y., AND ROBINSON, P. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In Proceedings of the 4th International Conference on Trust Management, 2006.
  • 20
    • 70349244712 scopus 로고    scopus 로고
    • KERSCHBAUM, F. AND SCHAAD, A. Privacy-Preserving Social Network Analysis for Criminal Investigations. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2008.
    • KERSCHBAUM, F. AND SCHAAD, A. Privacy-Preserving Social Network Analysis for Criminal Investigations. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2008.
  • 21
    • 48049095494 scopus 로고    scopus 로고
    • KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Logical Vector Clocks using Secure Computation Techniques. In Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007.
    • KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Logical Vector Clocks using Secure Computation Techniques. In Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007.
  • 22
    • 70349242396 scopus 로고    scopus 로고
    • KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Data Analytics as an Outsourced Service. In Proceedings of the ACM Workshop on Secure Web Services, 2008.
    • KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Data Analytics as an Outsourced Service. In Proceedings of the ACM Workshop on Secure Web Services, 2008.
  • 23
    • 50249162488 scopus 로고    scopus 로고
    • LI, J., AND ATALLAH, M. J. Secure and private collaborative linear programming. In Proceedings of International Conference on Collaborative Computing, 2006.
    • LI, J., AND ATALLAH, M. J. Secure and private collaborative linear programming. In Proceedings of International Conference on Collaborative Computing, 2006.
  • 24
    • 0031108822 scopus 로고    scopus 로고
    • Information distortion in a supply chain
    • PADMANABHAN, H., AND WHANG, S. Information distortion in a supply chain. Management Science 43(4), 1997.
    • (1997) Management Science , vol.43 , Issue.4
    • PADMANABHAN, H.1    WHANG, S.2
  • 25
    • 70349233400 scopus 로고    scopus 로고
    • PAILLIER, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt, 1999.
    • PAILLIER, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt, 1999.
  • 28
    • 70349234973 scopus 로고    scopus 로고
    • and Applications for Multi-Party Computation. PhD. Thesis of the University of Aarhus
    • TOFT, T. Primitives and Applications for Multi-Party Computation. PhD. Thesis of the University of Aarhus, 2007.
    • (2007)
    • TOFT, T.P.1
  • 29
    • 0020312165 scopus 로고    scopus 로고
    • YAO, A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science, 1982.
    • YAO, A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science, 1982.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.