{"title":"论文答辩","authors":"A. McFee, D. Whiteman, Barje Sulmane Maigadi","doi":"10.54631/vs.2022.61-105478","DOIUrl":null,"url":null,"abstract":"Security is vital for any distributed computing application running over a set of networked machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting incentives, or after being compromised by an external attacker. In addition to protection against data breaches, eavesdropping, or data manipulation, caused by Attacker-In-The-Middle threats, data management and computations that are jointly performed by individual machines, should satisfy application-specific properties that relate to fairness, privacy","PeriodicalId":40242,"journal":{"name":"Russian Journal of Vietnamese Studies-Vyetnamskiye issledovaniya","volume":" ","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2022-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dissertation defense\",\"authors\":\"A. McFee, D. Whiteman, Barje Sulmane Maigadi\",\"doi\":\"10.54631/vs.2022.61-105478\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is vital for any distributed computing application running over a set of networked machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting incentives, or after being compromised by an external attacker. In addition to protection against data breaches, eavesdropping, or data manipulation, caused by Attacker-In-The-Middle threats, data management and computations that are jointly performed by individual machines, should satisfy application-specific properties that relate to fairness, privacy\",\"PeriodicalId\":40242,\"journal\":{\"name\":\"Russian Journal of Vietnamese Studies-Vyetnamskiye issledovaniya\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2022-01-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Russian Journal of Vietnamese Studies-Vyetnamskiye issledovaniya\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54631/vs.2022.61-105478\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"AREA STUDIES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Russian Journal of Vietnamese Studies-Vyetnamskiye issledovaniya","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54631/vs.2022.61-105478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"AREA STUDIES","Score":null,"Total":0}
Security is vital for any distributed computing application running over a set of networked machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting incentives, or after being compromised by an external attacker. In addition to protection against data breaches, eavesdropping, or data manipulation, caused by Attacker-In-The-Middle threats, data management and computations that are jointly performed by individual machines, should satisfy application-specific properties that relate to fairness, privacy