Sciweavers

3047 search results - page 98 / 610
» A Secure Distributed Search System
Sort
View
HOTOS
2009
IEEE
15 years 7 months ago
Security Impact Ratings Considered Harmful
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived securi...
Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Pri...
ICPADS
2005
IEEE
15 years 8 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
EPEW
2007
Springer
15 years 9 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
HPDC
1999
IEEE
15 years 7 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
ICDCS
1997
IEEE
15 years 7 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh