Sciweavers

97 search results - page 5 / 20
» Secure Data Replication over Untrusted Hosts
Sort
View
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 3 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
NDSS
2006
IEEE
14 years 2 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
CCGRID
2007
IEEE
14 years 3 months ago
Study of Different Replica Placement and Maintenance Strategies in Data Grid
Data replication is an excellent technique to move and cache data close to users. By replication, data access performance can be improved dramatically. One of the challenges in da...
Rashedur M. Rahman, Ken Barker, Reda Alhajj
ICICS
1997
Springer
14 years 23 days ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
CN
2007
99views more  CN 2007»
13 years 8 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...