Towards bpel in the cloud: Exploiting different delivery models for the execution of business processes

T Anstett, F Leymann, R Mietzner… - 2009 Congress on …, 2009 - ieeexplore.ieee.org
More and more companies are outsourcing parts of their business processes to third party
providers to exploit the expertise and economies of scale of these third party providers. In …

[图书][B] Hardware-assisted secure computation

A Iliev - 2009 - search.proquest.com
The theory community has worked on Secure Multiparty Computation (SMC) for more than
two decades, and has produced many protocols for many settings. One common thread in …

[PDF][PDF] An agent-based approach for privacy-preserving information filtering

R Cissée - 2009 - depositonce.tu-berlin.de
Recommender Systems and Matchmaker Systems utilize Information Filtering technologies
in order to provide personalized information in the form of recommendations of items or …

Wake up or fall asleep-value implication of trusted computing

N Hu, J Huang, L Liu, Y Li, D Ma - Information Technology and …, 2009 - Springer
More than 10 years have passed since trusted computing (TC) technology was introduced to
the market; however, there is still no consensus about its value. The increasing importance …

Private Information Retrieval Scheme Combined with E-Payment in Querying Valuable Information

CH Chen, CH Hsu - 2009 Fourth International Conference on …, 2009 - ieeexplore.ieee.org
In the online retrieving valuable information in special databases, it is important to protect
the privacy of users preventing the server from knowing the information what the users …

[PDF][PDF] Privacy Preserving Keyword-based Retrieval over Encrypted Data

P Wang - 2009 - Citeseer
Since its conception, the Internet is growing rapidly, becoming accessible in an increasing
number of countries. The backbone of the internet is the network of high-bandwidth (optical …