Sciweavers

252 search results - page 7 / 51
» Scalability in a Secure Distributed Proof System
Sort
View
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 1 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
AGENTS
1997
Springer
13 years 12 months ago
Distributed Diagnosis by Vivid Agents
Many systems, such as large manufacturing systems, telecommunication networks, or homeautomation systems, require distributed monitoring and diagnosis. In this article, we introdu...
Michael Schroeder, Gerd Wagner
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 1 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
CCS
2005
ACM
14 years 1 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...