Sciweavers

793 search results - page 133 / 159
» Argumentation and standards of proof
Sort
View
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 4 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
RTA
2005
Springer
14 years 4 months ago
On Tree Automata that Certify Termination of Left-Linear Term Rewriting Systems
We present a new method for proving termination of term rewriting systems automatically. It is a generalization of the match bound method for string rewriting. To prove that a term...
Alfons Geser, Dieter Hofbauer, Johannes Waldmann, ...
SPC
2005
Springer
14 years 4 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 4 months ago
MINERVA: Collaborative P2P Search
This paper proposes the live demonstration of a prototype of MINERVA1 , a novel P2P Web search engine. The search engine is layered on top of a DHT-based overlay network that conn...
Matthias Bender, Sebastian Michel, Peter Triantafi...
SRDS
2003
IEEE
14 years 4 months ago
Assessing the Dependability of OGSA Middleware by Fault Injection
This paper presents our research on devising a dependability assessment method for the upcoming OGSA 3.0 middleware using network level fault injection. We compare existing DCE mi...
Nik Looker, Jie Xu