Sciweavers

1923 search results - page 88 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
ICDCS
2009
IEEE
15 years 7 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
CIS
2007
Springer
14 years 11 months ago
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment
Multi-domain application environments where distributed domains interoperate with each other are becoming a reality in Internet-based enterprise applications. The secure interoper...
Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu
NSDI
2008
15 years 3 days ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
DEBS
2007
ACM
15 years 1 months ago
A QoS policy configuration modeling language for publish/subscribe middleware platforms
Publish/subscribe (pub/sub) middleware platforms for eventbased distributed systems often provide many configurable policies that affect end-to-end quality of service (QoS). Altho...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...