Sciweavers

905 search results - page 15 / 181
» Public key distribution through
Sort
View
CMS
2003
120views Communications» more  CMS 2003»
13 years 8 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
SIGOPS
2010
186views more  SIGOPS 2010»
13 years 5 months ago
Are clouds ready for large distributed applications?
Cloud computing carries the promise of providing powerful ls and abstractions that could transform the way IT services are delivered today. In order to establish the readiness of ...
Kunwadee Sripanidkulchai, Sambit Sahu, Yaoping Rua...
APNOMS
2006
Springer
13 years 11 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 5 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
JNW
2008
103views more  JNW 2008»
13 years 7 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette