Sciweavers

250 search results - page 21 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
WETICE
1998
IEEE
15 years 2 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
GRID
2006
Springer
14 years 9 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
ACSAC
2000
IEEE
15 years 2 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
COMCOM
2008
138views more  COMCOM 2008»
14 years 9 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ACISICIS
2005
IEEE
15 years 3 months ago
A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems
Ubiquitous computing is viewed as a computing paradigm where minimal user intervention is necessitated emphasizing detection of environmental conditions and user behaviors in orde...
Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young...