Sciweavers

1286 search results - page 95 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
93
Voted
ICDCS
2005
IEEE
15 years 6 months ago
Equational Approach to Formal Analysis of TLS
TLS has been formally analyzed with the OTS/CafeOBJ method. In the method, distributed systems are modeled as transition systems, which are written in terms of equations, and it i...
Kazuhiro Ogata, Kokichi Futatsugi
117
Voted
ESCIENCE
2006
IEEE
15 years 7 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
99
Voted
ECOOPW
1999
Springer
15 years 5 months ago
Security in Active Networks
The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
119
Voted
COLCOM
2007
IEEE
15 years 5 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
119
Voted
CCS
2004
ACM
15 years 6 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li