Sciweavers

871 search results - page 63 / 175
» A Decentralized Authorization Architecture
Sort
View
BIRTHDAY
2003
Springer
15 years 3 months ago
Distributed Cooperation and Adversity: Complexity Trade-Offs
The problem of cooperatively performing a collection of tasks in a decentralized setting where the computing medium is subject to adversarial perturbations is one of the fundament...
Chryssis Georgiou, Alexander Russell, Alexander A....
HUC
2009
Springer
15 years 2 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode
GI
2001
Springer
15 years 2 months ago
DOL: An Interoperable Document Server
We describe the design and experiences gained with the database- and web-based document server DOL, which we developed at the University of Leipzig (http://dol.uni-leipzig.de). Th...
Sergey Melnik, Erhard Rahm, Dieter Sosna
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
COMCOM
2008
138views more  COMCOM 2008»
14 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...