University of Tartu

Displaying 1-12 of 12 results

  • White Papers // Dec 2011

    Deploying Secure Multi-Party Computation for Financial Data Analysis

    In this paper, the authors describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, they use secret sharing and secure Multi-Party Computation (MPC) techniques. While MPC has been used to solve real-life problems beforehand, this is the...

    Provided By University of Tartu

  • White Papers // May 2011

    An Approach to Assess and Compare Quality of Security Models

    System security is an important artefact. However, security is typically considered only at implementation stage nowadays in industry. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. On the one hand practitioners might not...

    Provided By University of Tartu

  • White Papers // May 2011

    Reserved or On-Demand Instances? a Revenue Maximization Model for Cloud Providers

    The authors examine the problem of managing a server farm in a way that attempts to maximize the net revenue earned by a cloud provider by renting servers to customers according to a typical Platform-as-a-Service model. The Cloud provider offers its resources to two classes of customers: 'Premium' and 'Basic'....

    Provided By University of Tartu

  • White Papers // Mar 2011

    Supporting MobileWeb Service Provisioning With Cloud Computing

    Web services are going mobile. A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which act as web service providers, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following web service standards, also on the radio link and...

    Provided By University of Tartu

  • White Papers // Jan 2011

    CTR-Mode Encryption

    Counter-Mode encryption ("CTR mode") was introduced by Diffie and Hellman already in 1979. It is indeed one of the best known modes. The authors suggest that NIST, in standardizing AES modes of operation, should include CTR-mode encryption as one possibility for the next reasons. First, CTR mode has significant efficiency...

    Provided By University of Tartu

  • White Papers // Oct 2010

    Scalable Mobile Web Services Mediation Framework

    Web services are going mobile. A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which act as web service providers, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following web service standards, also on the radio link and...

    Provided By University of Tartu

  • White Papers // May 2010

    Scaling Mobile Enterprise Through Cloud Computing

    Web Services (WS) are going mobile. A mobile enterprise can be established in a cellular network by participating mobile hosts, which act as WS providers, and their clients. Mobile hosts enable seamless integration of user-specific services to the enterprise, by following WS standards, also on the radio. The paper summarizes...

    Provided By University of Tartu

  • White Papers // Mar 2010

    On the Feasibility of Consistent Computations

    In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to formalize this type of corruption. In the current paper, the authors refine their model to get stronger security guarantees. Namely, they show how...

    Provided By University of Tartu

  • White Papers // Feb 2010

    SciCloud: Scientific Computing on the Cloud

    SciCloud is a project studying the scope of establishing private clouds at universities. With these clouds, researchers can efficiently use the already existing resources in solving computationally intensive scientific, mathematical, and academic problems. The project established a Eucalyptus based private cloud and developed several customized images that can be used...

    Provided By University of Tartu

  • White Papers // Nov 2009

    Efficient Generalized Selective Private Function Evaluation With Applications in Biometric Authentication

    In a Selective Private Function Evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database elements. The authors propose two new generalized SPFE protocols that are based on the new crypto-computing protocol by Ishai and Paskin and an...

    Provided By University of Tartu

  • White Papers // Oct 2009

    Shape Analysis of Low-Level C With Overlapping Structures

    Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this results in overlapping structures. Shape analyses have traditionally relied on a graph-based representation of memory where a node corresponds to a whole record and edges...

    Provided By University of Tartu

  • White Papers // Dec 2008

    Media Education As A Part Of Higher Education Curriculum

    European communication and education policy documents repeatedly refer to media literacy as a prerequisite of successfully performing active citizens and conscious consumers in information society. Substantial part of the task to provide systematic media education lies on the formal school-based education system. Hence a question arises about the competences teachers...

    Provided By University of Tartu

  • White Papers // Mar 2010

    On the Feasibility of Consistent Computations

    In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to formalize this type of corruption. In the current paper, the authors refine their model to get stronger security guarantees. Namely, they show how...

    Provided By University of Tartu

  • White Papers // Oct 2009

    Shape Analysis of Low-Level C With Overlapping Structures

    Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this results in overlapping structures. Shape analyses have traditionally relied on a graph-based representation of memory where a node corresponds to a whole record and edges...

    Provided By University of Tartu

  • White Papers // May 2010

    Scaling Mobile Enterprise Through Cloud Computing

    Web Services (WS) are going mobile. A mobile enterprise can be established in a cellular network by participating mobile hosts, which act as WS providers, and their clients. Mobile hosts enable seamless integration of user-specific services to the enterprise, by following WS standards, also on the radio. The paper summarizes...

    Provided By University of Tartu

  • White Papers // May 2011

    Reserved or On-Demand Instances? a Revenue Maximization Model for Cloud Providers

    The authors examine the problem of managing a server farm in a way that attempts to maximize the net revenue earned by a cloud provider by renting servers to customers according to a typical Platform-as-a-Service model. The Cloud provider offers its resources to two classes of customers: 'Premium' and 'Basic'....

    Provided By University of Tartu

  • White Papers // Feb 2010

    SciCloud: Scientific Computing on the Cloud

    SciCloud is a project studying the scope of establishing private clouds at universities. With these clouds, researchers can efficiently use the already existing resources in solving computationally intensive scientific, mathematical, and academic problems. The project established a Eucalyptus based private cloud and developed several customized images that can be used...

    Provided By University of Tartu

  • White Papers // Oct 2010

    Scalable Mobile Web Services Mediation Framework

    Web services are going mobile. A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which act as web service providers, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following web service standards, also on the radio link and...

    Provided By University of Tartu

  • White Papers // Nov 2009

    Efficient Generalized Selective Private Function Evaluation With Applications in Biometric Authentication

    In a Selective Private Function Evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database elements. The authors propose two new generalized SPFE protocols that are based on the new crypto-computing protocol by Ishai and Paskin and an...

    Provided By University of Tartu

  • White Papers // Dec 2011

    Deploying Secure Multi-Party Computation for Financial Data Analysis

    In this paper, the authors describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, they use secret sharing and secure Multi-Party Computation (MPC) techniques. While MPC has been used to solve real-life problems beforehand, this is the...

    Provided By University of Tartu

  • White Papers // May 2011

    An Approach to Assess and Compare Quality of Security Models

    System security is an important artefact. However, security is typically considered only at implementation stage nowadays in industry. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. On the one hand practitioners might not...

    Provided By University of Tartu

  • White Papers // Mar 2011

    Supporting MobileWeb Service Provisioning With Cloud Computing

    Web services are going mobile. A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which act as web service providers, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following web service standards, also on the radio link and...

    Provided By University of Tartu

  • White Papers // Dec 2008

    Media Education As A Part Of Higher Education Curriculum

    European communication and education policy documents repeatedly refer to media literacy as a prerequisite of successfully performing active citizens and conscious consumers in information society. Substantial part of the task to provide systematic media education lies on the formal school-based education system. Hence a question arises about the competences teachers...

    Provided By University of Tartu

  • White Papers // Jan 2011

    CTR-Mode Encryption

    Counter-Mode encryption ("CTR mode") was introduced by Diffie and Hellman already in 1979. It is indeed one of the best known modes. The authors suggest that NIST, in standardizing AES modes of operation, should include CTR-mode encryption as one possibility for the next reasons. First, CTR mode has significant efficiency...

    Provided By University of Tartu