Sciweavers

3047 search results - page 214 / 610
» A Secure Distributed Search System
Sort
View
CCS
1999
ACM
15 years 8 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
PDPTA
2004
15 years 5 months ago
Hierarchical Scheduling for State-based Services
Abstract-- Service descriptions based on type hiernd abstract service states ruling the availability of operations permit more secure service combinations in distributed systems de...
Jens Bruhn, Sven Kaffille, Guido Wirtz
NPC
2005
Springer
15 years 9 months ago
Adaptive Query-Caching in Peer-to-Peer Systems
Peer-to-Peer (P2P) architectures are very prevalent in today’s Internet. Lots of P2P file sharing systems using Gnutella protocol emerge out and draw attractions of millions of p...
Zuoning Yin, Hai Jin, Chao Zhang, Quan Yuan, Chuch...
114
Voted
ECTEL
2007
Springer
15 years 10 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl
239
Voted
POPL
2008
ACM
16 years 4 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk