Sciweavers

69 search results - page 14 / 14
» Surviving attacks on disruption-tolerant networks without au...
Sort
View
PRDC
2002
IEEE
13 years 9 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
SACMAT
2006
ACM
13 years 10 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
HUC
2010
Springer
13 years 6 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 10 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer