Sciweavers

1168 search results - page 196 / 234
» The Role of Trust Management in Distributed Systems Security
Sort
View
NDSS
2007
IEEE
15 years 6 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
INFOCOM
2009
IEEE
15 years 6 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
GCC
2003
Springer
15 years 5 months ago
Preserving Data Consistency in Grid Databases with Multiple Transactions
High performance Grid computing provides an infrastructure for access and processing of large volume, terabyte or even petabytes, of distributed data. Research in data grid has foc...
Sushant Goel, Hema Sharda, David Taniar
COMAD
2009
15 years 28 days ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy