—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
This paper discusses the requirements an agent system needs to be secure. In particular, the paper introduces a classification of modern distributed systems, and examines the dele...
Agostino Poggi, Giovanni Rimassa, Michele Tomaiuol...
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...