Paper 2015/804
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
Abstract
Abstract: This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. The definition of bioterrorism has been changed in terms of information security. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges. Keywords: Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism, Secure multi-party computation, Applied cryptography.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Security intelligenceThreat analyticsBusiness intelligenceCross border bio-terrorismSecure multi-party computationApplied cryptography
- Contact author(s)
- schakraborty2010 @ hotmail com
- History
- 2015-09-24: revised
- 2015-08-13: received
- See all versions
- Short URL
- https://ia.cr/2015/804
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/804, author = {Sumit Chakraborty}, title = {{SECURE} {MULTI}-{PARTY} {COMPUTATION}: {HOW} {TO} {SOLVE} {THE} {CONFLICT} {BETWEEN} {SECURITY} & {BUSINESS} {INTELLIGENCE}}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/804}, year = {2015}, url = {https://eprint.iacr.org/2015/804} }