Sciweavers

2139 search results - page 294 / 428
» Distributed computing and computer security education
Sort
View
ICPADS
2005
IEEE
14 years 3 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
ICTAC
2005
Springer
14 years 3 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
TPDS
1998
94views more  TPDS 1998»
13 years 10 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 10 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
WWW
2003
ACM
14 years 11 months ago
eduSource: Interoperable Network of Learning Object Repositories
In this paper, we describe the approach to achieve a high level of interoperability in the eduSource. The eduSource project is a panCanadian collaborative project to create a test...
Marek Hatala, Griff Richards