Sciweavers

848 search results - page 53 / 170
» Secure Information Flow for Distributed Systems
Sort
View
CCS
2006
ACM
15 years 3 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2005
ACM
15 years 5 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
DEBS
2010
ACM
14 years 8 months ago
Mobile XSiena: towards mobile publish/subscribe
Mobile XSiena is a novel publish/subscribe platform which seeks to extend the XSiena content-based publish/subscribe system in order to support user mobility and create an experim...
Zigor Salvador, Aurkene Alzua, Mikel Larrea, Alber...
KDD
2008
ACM
224views Data Mining» more  KDD 2008»
16 years 7 days ago
The structure of information pathways in a social communication network
Social networks are of interest to researchers in part because they are thought to mediate the flow of information in communities and organizations. Here we study the temporal dyn...
Gueorgi Kossinets, Jon M. Kleinberg, Duncan J. Wat...
DISCEX
2003
IEEE
15 years 5 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...