𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Bioterrorism, Threat Analytics and Secure Multi-party Computation

✍ Scribed by Sumit Chakraborty


Publisher
Business Analytics Research Lab India
Year
2013
Tongue
English
Leaves
10
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract: This work defines the security intelligence of a system based on secure multiparty computation in terms of correctness, fairness, trust, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges.
Keywords: Secure multi-party computation, Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism

✦ Table of Contents


The work is organized as follows. Section 1 starts with introduction which defines the problem and properties of secure multi-party computation. It reviews existing literature and analyzes the gaps, states research methodology and contributions of the work. Section 2 highlights modern bio-terrorism mechanism. Section 3 is focused on threat analytics. Section 4 discusses the cryptographic challenges of secure multi-party computation to resolve the conflict between security intelligence and business intelligence.

✦ Subjects


Bioterrorism


πŸ“œ SIMILAR VOLUMES


Compilation for Secure Multi-party Compu
✍ Niklas BΓΌscher, Stefan Katzenbeisser πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. M

Secure Multi-party Computation for Elect
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2015 πŸ› Business Analytics Research Lab India 🌐 English

Abstract: First, this work defines the traditional concept of secure multi-party computation. Next, it has redefined the concept of SMC from a broader perspective. The complexity and efficiency of secure multi-party computation are analyzed in terms of rationality, fairness, correctness, resiliency,

Bioterrorism: Threats and Deterrents
✍ S. Γ‡ankaya; M. Kibaroğlu πŸ“‚ Library πŸ“… 2010 πŸ› IOS Press, Incorporated 🌐 English

This book summarises the lectures presented at the Centre of Excellence - Defence Against Terrorism (COE-DAT) workshop on Bioterrorism of November 2008. The contributors are a diverse group of academics and practitioners, selected for their expertise in the field. Their contributions cover the defin

Analyzing Computer Security: A Threat /
✍ Charles P. Pfleeger, Shari Lawrence Pfleeger πŸ“‚ Library πŸ“… 2011 πŸ› Prentice Hall 🌐 English

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer securityβ€”so you can prevent serious problems and mitigate the effect

Secure Multi-Party Non-Repudiation Proto
✍ JosΓ© A. Onieva, Jianying Zhou πŸ“‚ Library πŸ“… 2008 πŸ› Springer 🌐 English

<P>The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with

Secure Multi-Party Non-Repudiation Proto
✍ JosΓ© A. Onieva, Javier Lopez, Jianying Zhou (auth.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer US 🌐 English

<p><P>Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. <STRONG>Secure Multi-Party Non-Repudiation Protocols and Applications</STRONG> supports