Sciweavers

422 search results - page 37 / 85
» Risk management for distributed authorization
Sort
View
141
Voted
WS
2005
ACM
15 years 6 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
SOFSEM
1998
Springer
15 years 4 months ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
118
Voted
EUROPKI
2004
Springer
15 years 6 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
97
Voted
CHI
2004
ACM
16 years 29 days ago
A social proxy for distributed tasks: design and evaluation of a working prototype
This paper describes an approach to managing tasks and processes that are distributed across a large number of people. The basic idea is to use a social visualization called a tas...
Thomas Erickson, Wei Huang, Catalina Danis, Wendy ...
ESSOS
2011
Springer
14 years 4 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen