Service-based Systems (SBS) have the advantage of composing distributed systems from various services provided by multiple providers transparently. In addition to functional correc...
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Grid applications have been prone to encountering problems such as failures or malicious attacks during execution, due to their distributed and large-scale features. The applicati...
Xuanhua Shi, Jean-Louis Pazat, Eric Rodriguez, Hai...
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...