Sciweavers

653 search results - page 96 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
CCS
2007
ACM
14 years 3 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
EGC
2005
Springer
14 years 2 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
ESAS
2006
Springer
14 years 25 days ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
ECRIME
2007
14 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ICCS
2004
Springer
14 years 2 months ago
Towards OGSA Compatibility in Alternative Metacomputing Frameworks
Abstract. Lately, grid research has focused its attention on interoperability and standards, such as Grid Services, in order to facilitate resource virtualization, and to accommoda...
Gunther Stuer, Vaidy S. Sunderam, Jan Broeckhove