Sciweavers

229 search results - page 35 / 46
» Distributed Key Management for Secure Role based Messaging
Sort
View
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
SACMAT
2003
ACM
14 years 28 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
DBSEC
2003
157views Database» more  DBSEC 2003»
13 years 9 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
CCGRID
2006
IEEE
14 years 1 months ago
Learning-Based Negotiation Strategies for Grid Scheduling
One of the key requirement for Grid infrastructures is the ability to share resources with nontrivial qualities of service. However, resource management in a decentralized infrast...
Jiadao Li, Ramin Yahyapour