Abstract. We describe the idea of a Science Gateway, an applicationspeciļ¬c task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ļ¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
We present a symbolic framework for reļ¬nement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of ļ¬ne-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...