Sciweavers

60 search results - page 9 / 12
» Reputation management and signature delegation: A distribute...
Sort
View
CIKM
2005
Springer
14 years 1 months ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
ESORICS
2006
Springer
13 years 11 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
COMPSAC
2010
IEEE
13 years 5 months ago
Behavior Monitoring in Self-Healing Service-Oriented Systems
Web services and service-oriented architecture (SOA) have become the de facto standard for designing distributed and loosely coupled applications. Many servicebased applications de...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
WWCA
1998
Springer
13 years 11 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...