Sciweavers

2442 search results - page 199 / 489
» Secure Service Orchestration
Sort
View
WETICE
1996
IEEE
15 years 9 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 8 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
ICMCS
1995
IEEE
115views Multimedia» more  ICMCS 1995»
15 years 8 months ago
Secure Pay-Per-View Testbed
Trials of Video on Demand and Pay-Per-View systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace th...
Dónal Cunningham, Donal O'Mahony
CSREASAM
2006
15 years 6 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
147
Voted
CN
2004
106views more  CN 2004»
15 years 4 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...