Sciweavers

6907 search results - page 74 / 1382
» Securing distributed adaptation
Sort
View
IFIP
2010
Springer
14 years 4 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
ECOOPW
1999
Springer
15 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
JCM
2008
73views more  JCM 2008»
14 years 9 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
15 years 2 months ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...
FTDB
2011
98views more  FTDB 2011»
14 years 1 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...