Sciweavers

33 search results - page 1 / 7
» A Signing Proxy for Web Services Security
Sort
View
IJNSEC
2006
67views more  IJNSEC 2006»
13 years 4 months ago
A Time-stamping Proxy Signature Scheme Using Time-stamping Service
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original si...
Eric Jui-Lin Lu, Cheng-Jian Huang
ACSAC
2004
IEEE
13 years 8 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
XMLSEC
2003
ACM
13 years 10 months ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
13 years 9 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...