Sciweavers

836 search results - page 96 / 168
» Privacy and Trust in Distributed Networks
Sort
View
140
Voted
JCSS
2006
102views more  JCSS 2006»
15 years 3 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
140
Voted
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
15 years 9 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
125
Voted
KESAMSTA
2010
Springer
15 years 5 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
142
Voted
CCS
2010
ACM
15 years 10 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
117
Voted
ACSAC
2009
IEEE
15 years 10 months ago
HIMA: A Hypervisor-Based Integrity Measurement Agent
Abstract—Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to provide both strong isolation between the ...
Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan ...