Sciweavers

247 search results - page 39 / 50
» Information hiding for trusted system design
Sort
View
CCS
2011
ACM
12 years 7 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
14 years 27 days ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
APNOMS
2009
Springer
14 years 2 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 1 months ago
An Integrated Approach to Online Partnership Building
Research in information sciences in recent years has dealt with how to support collaborative work across time, space and organizational boundaries. However, this research neglecte...
Tobias Keim, Tim Weitzel