Sciweavers

905 search results - page 63 / 181
» Public key distribution through
Sort
View
CCS
2007
ACM
14 years 3 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
ICDE
2007
IEEE
137views Database» more  ICDE 2007»
14 years 10 months ago
PASS Middleware for Distributed and Autonomous XML Message Processing
Basic message processing tasks, such as wellformedness checking and grammar validation, can be off-loaded from the service providers' own infrastructures. To enable effective...
Dirceu Cavendish, K. Selçuk Candan
VLDB
2002
ACM
161views Database» more  VLDB 2002»
13 years 8 months ago
Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection
Many valuable text databases on the web have non-crawlable contents that are "hidden" behind search interfaces. Metasearchers are helpful tools for searching over many s...
Panagiotis G. Ipeirotis, Luis Gravano
ESORICS
2006
Springer
14 years 15 days ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
ISPAN
2005
IEEE
14 years 2 months ago
Secure Continuity for Sensor Networks
Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leon...