Sciweavers

2139 search results - page 133 / 428
» Distributed computing and computer security education
Sort
View
SAC
2002
ACM
15 years 2 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SACMAT
2004
ACM
15 years 8 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
15 years 2 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
PODC
2010
ACM
15 years 3 months ago
On the theoretical gap between synchronous and asynchronous MPC protocols
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if
Zuzana Beerliová-Trubíniová, ...
GPC
2009
Springer
15 years 24 days ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb