Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...