selected publications chapter Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments. Lecture notes in computer science. 211-222. 2009