Sciweavers

90 search results - page 10 / 18
» Specifying Authentication Protocols Using Rewriting and Stra...
Sort
View
FORTE
2011
14 years 1 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
MMMACNS
2010
Springer
14 years 8 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
77
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
EMISA
2005
Springer
15 years 3 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle
ACIIDS
2009
IEEE
89views Database» more  ACIIDS 2009»
15 years 1 months ago
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes
Inter domain service routing is an element in the success of Next Generation Network. Service requests, such as the INVITE request in Session Initiation Protocol [21] may need to ...
David Lai, Zhongwei Zhang