Sciweavers

1381 search results - page 54 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
OSDI
2006
ACM
15 years 11 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
NOSSDAV
2009
Springer
15 years 5 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
SAINT
2007
IEEE
15 years 5 months ago
Proposal of Constructing PKI on Overlay Network
In this paper, we present the design of foundation PKI (fPKI), a PKI system constructed on an overlay network for an open source community. fPKI can provide an alternative PKI sys...
Yukio Okada, Hiroaki Hazeyama, Youki Kadobayashi
ICOIN
2003
Springer
15 years 4 months ago
Do Not Trust All Simulation Studies of Telecommunication Networks
Since the birth of ARPANET and the first commercial applications of computer networks, through explosion of popularity of the Internet and wireless communications, we have witnes...
Krzysztof Pawlikowski
NDSS
1998
IEEE
15 years 3 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...