Sciweavers

2335 search results - page 129 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
148
Voted
CCS
2000
ACM
15 years 9 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
ACSAC
2009
IEEE
15 years 11 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
128
Voted
SWS
2004
ACM
15 years 10 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
122
Voted
AUTOMATICA
2006
84views more  AUTOMATICA 2006»
15 years 5 months ago
Optimal control of LTI systems over unreliable communication links
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications...
Orhan C. Imer, Serdar Yüksel, Tamer Basar