Sciweavers

726 search results - page 105 / 146
» Securing XML data in third-party distribution systems
Sort
View
PET
2004
Springer
14 years 1 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
USS
2010
13 years 5 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
DSN
2009
IEEE
13 years 5 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
TDSC
2010
160views more  TDSC 2010»
13 years 2 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
EUROPKI
2007
Springer
14 years 1 months ago
AutoPKI: A PKI Resources Discovery System
The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a P...
Massimiliano Pala, Sean W. Smith