Sciweavers

661 search results - page 84 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
IEEEAMS
2003
IEEE
14 years 2 months ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 3 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
CCS
2007
ACM
14 years 3 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
ESCIENCE
2006
IEEE
14 years 3 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...