Sciweavers

24 search results - page 3 / 5
» Transparently Adding Security Properties to Service Orchestr...
Sort
View
OTM
2007
Springer
13 years 11 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
TC
1998
13 years 5 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
COMPSAC
2005
IEEE
13 years 11 months ago
Self-Configuring Communication Middleware Model for Multiple Network Interfaces
Communication middleware such as MuniCluster provides highlevel communication mechanisms for networked applications through hiding the low-level communication details from the app...
Nader Mohamed
ENTCS
2007
131views more  ENTCS 2007»
13 years 5 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
COMCOM
2002
105views more  COMCOM 2002»
13 years 5 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou