Sciweavers

194 search results - page 19 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
83
Voted
WWW
2009
ACM
15 years 10 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
MTA
2008
83views more  MTA 2008»
14 years 9 months ago
Caching collaboration and cache allocation in peer-to-peer video systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
OTM
2009
Springer
15 years 2 months ago
Optimizing Data Management in Grid Environments
Grids currently serve as platforms for numerous scientific as well as business applications that generate and access vast amounts of data. In this paper, we address the need for e...
Antonis Zissimos, Katerina Doka, Antony Chazapis, ...
ESORICS
2010
Springer
14 years 10 months ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu