Sciweavers

160 search results - page 22 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
ISORC
2002
IEEE
14 years 1 months ago
Reactive Objects
Object-oriented, concurrent, and event-based programming models provide a natural framework in which to express the behavior of distributed and embedded software systems. However,...
Johan Nordlander, Mark P. Jones, Magnus Carlsson, ...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 1 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
AAMAS
2006
Springer
13 years 8 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
CCGRID
2009
IEEE
14 years 3 months ago
Self-Chord: A Bio-inspired Algorithm for Structured P2P Systems
This paper presents ā€œSelf-Chordā€, a bio-inspired P2P algorithm that can be proļ¬tably adopted to build the information service of distributed systems, in particular Computati...
Agostino Forestiero, Carlo Mastroianni, Michela Me...