In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide uniļ¬ed services. However, scalable access control for mashups is difļ¬cult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Abstract. We describe the idea of a Science Gateway, an applicationspeciļ¬c task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...