Sciweavers

1286 search results - page 94 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
113
Voted
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 6 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
94
Voted
ICDCS
2006
IEEE
15 years 7 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
115
Voted
CCS
2009
ACM
16 years 1 months ago
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, mo...
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...
125
Voted
FOCS
2007
IEEE
15 years 7 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
CSFW
2011
IEEE
14 years 28 days ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...