Sciweavers

2560 search results - page 186 / 512
» Securing VO Management
Sort
View
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 11 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
EEE
2005
IEEE
15 years 10 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
140
Voted
DRM
2004
Springer
15 years 10 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
118
Voted
APNOMS
2006
Springer
15 years 8 months ago
Security Approaches for Cluster Interconnection in a Wireless Sensor Network
Abstract. A wireless sensor network is a collection of devices limited in lowpowered batteries, processing, communication bandwidth capabilities and low memory availability. Due to...
Alexandre Gava Menezes, Carlos Becker Westphall
164
Voted
APNOMS
2006
Springer
15 years 8 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang