Sciweavers

2560 search results - page 23 / 512
» Securing VO Management
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 4 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
ISSE
2006
13 years 11 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
ICICS
2003
Springer
14 years 4 months ago
A Novel Two-Level Trust Model for Grid
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Tieyan Li, Huafei Zhu, Kwok-Yan Lam
ISW
1997
Springer
14 years 3 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
14 years 4 months ago
Application Service Providing as Part of Intelligent Decision Support for Supply Chain Management
A prominent trend in the software industry in the late 1990s was the development of the application service providing business model. Application service providers (ASP)1 offer th...
Tanja Falkowski, Stefan Voß