Sciweavers

2057 search results - page 27 / 412
» Distributed Secure Systems: Then and Now
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 6 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
SDMW
2004
Springer
14 years 4 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
SAINT
2003
IEEE
14 years 4 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
EUROPLOP
2006
14 years 10 days ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
14 years 3 months ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist