Sciweavers

48 search results - page 4 / 10
» Dealing with Multi-policy Security in Large Open Distributed...
Sort
View
WAIM
2010
Springer
15 years 5 days ago
HyperGraphDB: A Generalized Graph Database
We present HyperGraphDB, a novel graph database based on generalized hypergraphs where hyperedges can contain other hyperedges. This generalization automatically reifies every ent...
Borislav Iordanov
121
Voted
CCS
2007
ACM
15 years 8 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
93
Voted
ESORICS
2005
Springer
15 years 7 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
113
Voted
OSDI
2002
ACM
16 years 2 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
125
Voted
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 8 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci