Sciweavers

21 search results - page 4 / 5
» Secure Intrusion-tolerant Replication on the Internet
Sort
View
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
13 years 9 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
IEEEARES
2006
IEEE
13 years 11 months ago
Making Web Services Dependable
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
USENIX
2000
13 years 6 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
AAAIDEA
2005
IEEE
13 years 11 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
EPEW
2007
Springer
13 years 11 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...