Sciweavers

6907 search results - page 69 / 1382
» Securing distributed adaptation
Sort
View
CSREASAM
2003
14 years 11 months ago
Implementing a Prototype of the Security Framework for Distributed Brokering Systems
Security is an important element of any system design. Entities supported by a system need to securely interact with each other. The problem gets even more complex in the context ...
Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallicka...
ICICS
1997
Springer
15 years 1 months ago
Secure document management and distribution in an open network environment
Abstract. This paper analyzes the problem of secure document management and distribution in an open network environment. Reader and author authentication, document integrity, origi...
Antonio Lioy, Fabio Maino, Marco Mezzalama
ICIP
2003
IEEE
15 years 11 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
STORAGESS
2005
ACM
15 years 3 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
FC
2009
Springer
135views Cryptology» more  FC 2009»
15 years 4 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags