SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE

@inproceedings{Chakraborty2013SECUREMC,
  title={SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE},
  author={Sumit Chakraborty},
  year={2013}
}
This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

A study of several specific secure two-party computation problems

  • W. Du
  • Doctoral dissertation, Purdue University,
  • 2001
1 Excerpt

A study of several privacypreserving multi - party negotiation problems with applications to supply chain management

  • S. Chakraborty.

Similar Papers

Loading similar papers…