D. Hart (USA)
distributed computing, mobile code, confidentiality, secu rity
This paper describes an approach to protect the confiden tiality of data used in a distributed computation. Data de coys provide a simple security mechanism and utilizes a minimum of trust, assuming that only the server is secure. The paper illustrates how decoys could be used via two ex ample applications and characterizes the costs and benefits of this technique.
Important Links:
Go Back