Sciweavers

1488 search results - page 172 / 298
» Botnets for Scalable Management
Sort
View
CCGRID
2004
IEEE
15 years 8 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
ARCS
2006
Springer
15 years 8 months ago
Large Event Traces in Parallel Performance Analysis
: A powerful and widely-used method for analyzing the performance behavior of parallel programs is event tracing. When an application is traced, performancerelevant events, such as...
Felix Wolf, Felix Freitag, Bernd Mohr, Shirley Moo...
CCS
2006
ACM
15 years 8 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
ADBIS
2006
Springer
139views Database» more  ADBIS 2006»
15 years 8 months ago
Xeek: An Efficient Method for Supporting XPath Evaluation with Relational Databases
We introduce Xeek, a method for managing XML documents using relational databases. Most previous proposals in which the XPath axes are evaluated using only the pre- and postorder n...
Olli Luoma
ACSAC
2001
IEEE
15 years 8 months ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler