Sciweavers

430 search results - page 44 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
CONCUR
2005
Springer
15 years 5 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
CORR
2008
Springer
103views Education» more  CORR 2008»
14 years 12 months ago
Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime
Distributed systems are now both very large and highly dynamic. Peer to peer overlay networks have been proved efficient to cope with this new deal that traditional approaches can ...
Vincent Gramoli, Anne-Marie Kermarrec, Achour Most...
CCS
2006
ACM
15 years 3 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
PDP
2007
IEEE
15 years 6 months ago
RealPeer--A Framework for Simulation-Based Development of Peer-to-Peer Systems
In the process of developing P2P systems simulation has proved to be an essential tool for the evaluation of existing and conceived P2P systems. So far, in practice there has been...
Dieter Hildebrandt, Ludger Bischofs, Wilhelm Hasse...
DOA
2000
116views more  DOA 2000»
15 years 1 months ago
Jini Technology Applied to Railway Systems
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
Txomin Nieva, Andreas Fabri, Abdenbi Benammour