Sciweavers

1144 search results - page 42 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 5 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
OTM
2007
Springer
15 years 7 months ago
Fine Grained Access Control with Trust and Reputation Management for Globus
Abstract. We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation...
Maurizio Colombo, Fabio Martinelli, Paolo Mori, Ma...
IPPS
2006
IEEE
15 years 7 months ago
Realization of virtual networks in the DECOS integrated architecture
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
Roman Obermaisser, Philipp Peti
CEC
2008
IEEE
15 years 7 months ago
An approach to intrusion detection by means of idiotypic networks paradigm
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
APNOMS
2006
Springer
15 years 5 months ago
An Architectural Framework for Network Convergence Through Application Level Presence Signaling
Over the past few years we have witnessed steady progress toward convergence in communications. We believe we are now witnessing nce beyond just media transport. Further, abstract ...
Atanu Mukherjee