Fundraising September 15, 2024 – October 1, 2024 About fundraising

Bioterrorism, Threat Analytics and Secure Multi-party...

Bioterrorism, Threat Analytics and Secure Multi-party Computation

Sumit Chakraborty
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Abstract: This work defines the security intelligence of a system based on secure multiparty computation in terms of correctness, fairness, trust, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges.
Keywords: Secure multi-party computation, Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism
Year:
2013
Edition:
1
Publisher:
Business Analytics Research Lab India
Language:
english
Pages:
10
File:
PDF, 425 KB
IPFS:
CID , CID Blake2b
english, 2013
Read Online
Conversion to is in progress
Conversion to is failed

Most frequently terms