Sciweavers

55 search results - page 11 / 11
» Addressing the Problem of Undetected Signature Key Compromis...
Sort
View
ISSA
2004
13 years 7 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
OAS
2003
13 years 7 months ago
An ontology for Web service ratings and reputations
Current Web services standards enable publishing service descriptions and finding services by matching requested and published descriptions based on syntactic criteria such as me...
E. Michael Maximilien, Munindar P. Singh
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 6 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
POPL
2000
ACM
13 years 10 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
WS
2003
ACM
13 years 11 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe