Sciweavers

2517 search results - page 160 / 504
» Secure Deployment of Components
Sort
View
COMCOM
2006
120views more  COMCOM 2006»
15 years 3 months ago
Explicit routing in multicast overlay networks
Application Level Multicast is a promising approach to overcome the deployment problems of IP level multicast by establishing delivery trees using overlay links among end systems....
Torsten Braun, Vijay Arya, Thierry Turletti
CSFW
2006
IEEE
15 years 10 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
SAC
2009
ACM
15 years 10 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
SP
2006
IEEE
15 years 9 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
ESORICS
2006
Springer
15 years 7 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...