Sciweavers

548 search results - page 51 / 110
» Secure peer sampling
Sort
View
ICSOC
2005
Springer
14 years 3 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
COMCOM
2008
84views more  COMCOM 2008»
13 years 10 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 10 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
IWSEC
2007
Springer
14 years 4 months ago
Processing Multi-parameter Attacktrees with Estimated Parameter Values
Abstract. Authors extend the multi-parameter attacktree model to include inaccurate or estimated parameter values, which are modelled as probabilistic interval estimations. The pap...
Aivo Jürgenson, Jan Willemson
TGC
2007
Springer
14 years 4 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou