Sciweavers

131 search results - page 7 / 27
» Incorporating Trust in Network Virtualization
Sort
View
WICSA
2004
14 years 11 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
EUC
2008
Springer
14 years 11 months ago
Trusted Spanning Tree for Delay Tolerant MANETs
Quality of service is an important issue in Delay Tolerant Mobile Ad-Hoc Networks (DTMs). This work attempts to improve the Quality of service (QoS) in DTMs by relying on spanning...
Apivadee Piyatumrong, Pascal Bouvry, Fréd&e...
CN
2002
87views more  CN 2002»
14 years 9 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
NOSSDAV
2009
Springer
15 years 4 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
ICDCS
2005
IEEE
15 years 3 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit