Sciweavers

2442 search results - page 329 / 489
» Secure Service Orchestration
Sort
View
POPL
2005
ACM
15 years 3 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
ESORICS
2004
Springer
15 years 3 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
EUROPKI
2004
Springer
15 years 3 months ago
The EuroPKI Experience
Abstract. This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. First the context where EuroPKI was born is...
Antonio Lioy, Marius Marian, Natalia Moltchanova, ...
ICCS
2004
Springer
15 years 3 months ago
Towards OGSA Compatibility in Alternative Metacomputing Frameworks
Abstract. Lately, grid research has focused its attention on interoperability and standards, such as Grid Services, in order to facilitate resource virtualization, and to accommoda...
Gunther Stuer, Vaidy S. Sunderam, Jan Broeckhove
TRUSTBUS
2004
Springer
15 years 3 months ago
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
This paper addresses the problem of pay-as-you-watch services over unicast and multicast communications. For each communication model, we present two solutions, non-verifiable and...
Antoni Martínez-Ballesté, Francesc S...