Providing data confidentiality against malicious hosts in shared data spaces
From MaRDI portal
Publication:967526
DOI10.1016/J.SCICO.2009.07.011zbMATH Open1192.68244OpenAlexW2133076806MaRDI QIDQ967526FDOQ967526
Authors: Giovanni Russello, Changyu Dong, Naranker Dulay, Maarten Van Steen, Michel R. V. Chaudron
Publication date: 29 April 2010
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.scico.2009.07.011
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Foundations of Cryptography
- Generative communication in Linda
- Title not available (Why is that?)
- Coordinating processes with secure spaces
- Secure shared data-space coordination languages: a process algebraic survey
- Supporting secure coordination in SecSpaces
- Title not available (Why is that?)
- Title not available (Why is that?)
Uses Software
This page was built for publication: Providing data confidentiality against malicious hosts in shared data spaces
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q967526)