D. Hart (USA)
distributed computing, mobile code, confidentiality, secu
This paper describes an approach to protect the confiden
tiality of data used in a distributed computation. Data de
coys provide a simple security mechanism and utilizes a
minimum of trust, assuming that only the server is secure.
The paper illustrates how decoys could be used via two ex
ample applications and characterizes the costs and benefits
of this technique.