A common technique for result verification in grid computing is to delegate a computation redundantly to different workers and apply majority voting to the returned results. Howe...
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
— Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have mad...
Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan...
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Contracts in the real world often rest upon a notion of responsibility, by which parties commit to the fulfilment of particular imperatives embedded in the contract. Responsibili...
Martin J. Kollingbaum, Timothy J. Norman, Chris Re...