Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cyber ForagingSecurity and Privacy

Cyber Foraging: Security and Privacy [This chapter explores the security and privacy challenges that arise from supporting cyber foraging. Several challenges such as secure communication between the mobile computer and surrogates are standard challenges in other domains. Primarily, the challenges unique to cyber foraging come from executing arbitrary computation on shared surrogates owned and managed by third parties with whom the owner of a mobile computer may not have a pre-existing trust relationship. This chapter will therefore focus on these specific issues.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Cyber ForagingSecurity and Privacy

Loading next page...
 
/lp/springer-journals/cyber-foraging-security-and-privacy-AJecL00edw

References (0)

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Springer International Publishing
Copyright
© Springer Nature Switzerland AG 2012
ISBN
978-3-031-01353-9
Pages
53 –64
DOI
10.1007/978-3-031-02481-8_4
Publisher site
See Chapter on Publisher Site

Abstract

[This chapter explores the security and privacy challenges that arise from supporting cyber foraging. Several challenges such as secure communication between the mobile computer and surrogates are standard challenges in other domains. Primarily, the challenges unique to cyber foraging come from executing arbitrary computation on shared surrogates owned and managed by third parties with whom the owner of a mobile computer may not have a pre-existing trust relationship. This chapter will therefore focus on these specific issues.]

Published: Jan 1, 2012

There are no references for this article.