Sciweavers

6844 search results - page 1133 / 1369
» Web Service Security
Sort
View
ICCSA
2005
Springer
15 years 10 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
WAC
2005
Springer
122views Communications» more  WAC 2005»
15 years 10 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
ATAL
2004
Springer
15 years 9 months ago
Coordinating Multiple Concurrent Negotiations
To secure good deals, an agent may engage in multiple concurrent negotiations for a particular good or service. However for this to be effective, the agent needs to carefully coor...
Thuc Duong Nguyen, Nicholas R. Jennings
GCC
2004
Springer
15 years 9 months ago
Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. I...
Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Pe...
« Prev « First page 1133 / 1369 Last » Next »