Sciweavers

3638 search results - page 88 / 728
» Distribution chain security
Sort
View
WETICE
1996
IEEE
14 years 1 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
SPW
1997
Springer
14 years 1 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
IJHPCN
2008
63views more  IJHPCN 2008»
13 years 9 months ago
On the secure creation, organisation and discovery of topics in distributed publish/subscribe systems
: Publish/Subscribe infrastructures have gained significant traction recently with several specifications such as the Java Message Service (JMS), WS-Eventing and WS-Notification. I...
Shrideep Pallickara, Geoffrey Fox, Harshawardhan G...
IFIP
2010
Springer
13 years 3 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
ECOOPW
1999
Springer
14 years 1 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis