STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Role-Based Access Control Models
Computer
Information distortion in a supply chain: the bullwhip effect
Management Science - Special issue on frontier research in manufacturing and logistics
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
Combinatorics of Permutations
Proceedings of the 3rd ACM workshop on Secure web services
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
Journal of Systems and Software - Special issue: Quality software
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Distance-preserving pseudonymization for timestamps and spatial data
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Building a Privacy-Preserving Benchmarking Enterprise System
EDOC '07 Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Privacy-preserving logical vector clocks using secure computation techniques
ICPADS '07 Proceedings of the 13th International Conference on Parallel and Distributed Systems - Volume 01
Privacy-preserving social network analysis for criminal investigations
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy-preserving data analytics as an outsourced service
Proceedings of the 2008 ACM workshop on Secure web services
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
PathTrust: a trust-based reputation service for virtual organization formation
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
Security research has long focused on protecting against outside attackers. This was augmented with protection against insider threats, but recently networked business is emerging. With it a new threat is emerging: security against the business partner. A possible solution is secure multi-party computation (SMC) and we give examples of its usefulness. We show with the example of supply chain optimization that only SMC provides the necessary security guarantees. A major challenge of SMC is its practical realization. We give a detailed study and analysis of multi-party permutation and show the relations of the different theoretical complexities in this case. The paper concludes with a comparison of service-oriented architectures and SMC. We show several architectural differences that need to be overcome.