Sciweavers

1092 search results - page 154 / 219
» Located Operators
Sort
View
SRDS
2003
IEEE
15 years 5 months ago
Preventing Orphan Requests in the Context of Replicated Invocation
In today’s systems, applications are composed from various components that may be located on different machines. The components (acting as servers) may have to collaborate in or...
Stefan Pleisch, Arnas Kupsys, André Schiper
SRDS
2003
IEEE
15 years 5 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
DEBS
2003
ACM
15 years 5 months ago
Client mobility in rendezvous-notify
Event-based computing is vital for the next generation mobile services and applications that need to meet user requirements irrespective of time and location. The event paradigm i...
Sasu Tarkoma, Jaakko Kangasharju, Kimmo E. E. Raat...
CCS
2003
ACM
15 years 5 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
IFIP
2003
Springer
15 years 5 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott