Sciweavers

170 search results - page 4 / 34
» Maille authorization - a distributed, redundant authorizatio...
Sort
View
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 1 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
IPPS
2000
IEEE
13 years 12 months ago
Safe Caching in a Distributed File System for Network Attached Storage
In a distributed file system built on network attached storage, client computers access data directly from shared storage, rather than submitting I/O requests through a server. W...
Randal C. Burns, Robert M. Rees, Darrell D. E. Lon...
ACSAC
2005
IEEE
14 years 1 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...
SIES
2010
IEEE
13 years 5 months ago
An Energy-Aware Algorithm for TDMA MAC Protocols in Real-Time Wireless Networks
Abstract--In distributed embedded systems operated by battery, energy management is a critical issue that has to be addressed at different architecture levels. For systems that tig...
Gianluca Franchino, Giorgio C. Buttazzo, Mauro Mar...
ETRICS
2006
13 years 11 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...