Sciweavers

3047 search results - page 26 / 610
» A Secure Distributed Search System
Sort
View
USENIX
2004
15 years 13 days ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....
NDSS
2005
IEEE
15 years 4 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
CCS
1994
ACM
15 years 3 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
ACSAC
2006
IEEE
15 years 5 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
WISTP
2010
Springer
14 years 9 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel