Sciweavers

322 search results - page 43 / 65
» Entity Authentication and Key Distribution
Sort
View
ADBIS
1999
Springer
109views Database» more  ADBIS 1999»
14 years 24 days ago
Workflow Management System Using Mobile Agents
Abstract. In [1, 8] we proposed a complete design of a workflow management system using mobile agents. The proposed solution was highly distributed and almost without centralized ...
Zoran Budimac, Mirjana Ivanovic, Aleksandar Popovi...
GRID
2007
Springer
14 years 11 days ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...
JNW
2006
186views more  JNW 2006»
13 years 8 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
USENIX
2003
13 years 9 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
JAIR
2007
151views more  JAIR 2007»
13 years 8 months ago
Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email
Previous work in social network analysis (SNA) has modeled the existence of links from one entity to another, but not the attributes such as language content or topics on those li...
Andrew McCallum, Xuerui Wang, Andrés Corrad...