摘要:
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
摘要:
An approach is provided for providing biometric information processing using distributed computation. A biometric information processing infrastructure determines to receive an input including, at least in part, biometric information. The biometric information processing infrastructure selects one or more analyses for processing the input. The biometric information processing infrastructure also determines one or more processes associated with the one or more analyses. The biometric information processing infrastructure further determines to derive one or more computation closures from the one or more processes. The biometric information processing infrastructure determines to decompose the one or more computation closures for distribution in one or more computation spaces.
摘要:
An approach is provided for applying execution context criteria for secure execution context sharing. A criterion application retrieves an execution context of a device. The criterion application determines one or more context criteria associated with the execution context. The context criteria include state information associated with the execution context. The criterion application encrypts the execution context using the one or more context criteria as a public key of an identity-based encryption.
摘要:
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
摘要:
An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof. The distributed computation construction infrastructure further causes, at least in part, aggregation of the one or more primitives and the respective process states to reconstruct at least a portion of the execution context based, at least in part, on consistency determination.
摘要:
An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof. The distributed computation construction infrastructure further causes, at least in part, aggregation of the one or more primitives and the respective process states to reconstruct at least a portion of the execution context based, at least in part, on consistency determination.
摘要:
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
摘要:
An approach is provided for providing secure access to execution context. An execution security platform determines an execution context of a device, the execution context including at least in part one or more computation closures. The execution security platform also processes and/or facilitates a processing of the execution context, the one or more computation closures, or a combination thereof to cause, at least in part, decomposition of the execution context, the one or more computation closures, or a combination thereof into, at least in part, one or more context criteria and content information, The execution security platform further determines to encrypt the execution context, the one or more computation closures, the content information, or a combination thereof using the one or more context criteria as a public key of an identity-based encryption.
摘要:
An approach is provided for binding user interface elements and granular reflective processing. An information management infrastructure determines to detect an event, from a first device, for specifying one or more user interface elements for transfer to a second device. The information management infrastructure further identifies one or more processes bound to the user interface elements. The information management infrastructure also determines at least one of a user context, an execution context within the user context, and one or more other execution contexts for the processes, wherein the one or more other execution contexts are from at least one of the user context and one or more other user contexts. The information management infrastructure further causes, at least in part, serialization of at least one of the user context, the execution context, and the one or more other execution contexts. The information management infrastructure further determines to transmit the serialization to the second device to initiate reconstruction of the at least one of the user context, the execution context, and the one or more other execution contexts.
摘要:
An approach is provided for binding user interface elements and granular reflective processing. An information management infrastructure determines to detect an event, from a first device, for specifying one or more user interface elements for transfer to a second device. The information management infrastructure further identifies one or more processes bound to the user interface elements. The information management infrastructure also determines at least one of a user context, an execution context within the user context, and one or more other execution contexts for the processes, wherein the one or more other execution contexts are from at least one of the user context and one or more other user contexts. The information management infrastructure further causes, at least in part, serialization of at least one of the user context, the execution context, and the one or more other execution contexts. The information management infrastructure further determines to transmit the serialization to the second device to initiate reconstruction of the at least one of the user context, the execution context, and the one or more other execution contexts.