Sciweavers

28 search results - page 6 / 6
» On identity assurance in the presence of federated identity ...
Sort
View
COMPUTER
1998
131views more  COMPUTER 1998»
13 years 4 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
EGOV
2005
Springer
13 years 10 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
CCS
2003
ACM
13 years 10 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves