Sciweavers

4111 search results - page 271 / 823
» Security, Protocols, and Trust
Sort
View
104
Voted
WETICE
1998
IEEE
15 years 5 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
SEC
2007
15 years 2 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
94
Voted
JHSN
2006
96views more  JHSN 2006»
15 years 23 days ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
60
Voted
ATAL
2005
Springer
15 years 6 months ago
Untraceability of mobile agents
In the article we present two untraceability protocols for mobile agents. Comparing to other solutions, the advantage of the protocols is that they support agent’s autonomy in c...
Rafal Leszczyna, Janusz Górski
106
Voted
LPAR
2005
Springer
15 years 6 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...