2019 IEEE Cybersecurity Development (SecDev) 2019
DOI: 10.1109/secdev.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications

Abstract: Software applications that employ secure multi-party computation (MPC) can empower individuals and organizations to benefit from privacy-preserving data analyses when data sharing is encumbered by confidentiality concerns, legal constraints, or corporate policies. MPC is already being incorporated into software solutions in some domains; however, individual use cases do not fully convey the variety, extent, and complexity of the opportunities of MPC. This position paper articulates a rolebased perspective that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 55 publications
0
2
0
Order By: Relevance
“…Current applications have largely targeted smaller amounts of data. For example, one work-around is using TSS to secure strong passwords rather than to secure the data themselves (Koens,19 January 2021 [64]).…”
Section: Examples Of Data Accountability Tools Includementioning
confidence: 99%
“…Current applications have largely targeted smaller amounts of data. For example, one work-around is using TSS to secure strong passwords rather than to secure the data themselves (Koens,19 January 2021 [64]).…”
Section: Examples Of Data Accountability Tools Includementioning
confidence: 99%
“…JIFF [34] is a general-purpose MPC framework that generalizes Web-MPC along two dimensions: (1) it supports arbitrary computations (as opposed to only aggregation) and (2) it allows designers to customize an application to match the specific resource profiles of participants by defining the roles they play in the computation [21]. JIFF utilizes a server to store and route encrypted messages sent between the various participating parties.…”
Section: Javascript Implementation Of Federated Functionalities (Jiff)mentioning
confidence: 99%