Sciweavers

5665 search results - page 291 / 1133
» Introduction to Computer Security
Sort
View
142
Voted
SOCA
2007
IEEE
15 years 6 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
SAC
2006
ACM
15 years 6 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
EDCC
2005
Springer
15 years 6 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
FTDCS
2003
IEEE
15 years 5 months ago
Secure Middleware for Situation-Aware Naval C2 and Combat Systems
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
Ramesh Bharadwaj
126
Voted
HPDC
2003
IEEE
15 years 5 months ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...