Sciweavers

224 search results - page 13 / 45
» Secrecy in Untrusted Networks
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
EUROPKI
2004
Springer
14 years 3 days ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
OSDI
2002
ACM
14 years 7 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 4 days ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
DANCE
2002
IEEE
13 years 11 months ago
Janos: A Java-Oriented OS for Active Network Nodes
Janos is an operating system for active network nodes whose primary focus is strong resource management and control of untrusted active applications written in Java. Janos include...
Patrick Tullmann, Mike Hibler, Jay Lepreau