Sciweavers

434 search results - page 53 / 87
» Security Documentation
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Trust Credential Distribution in Autonomic Networks
Abstract—Autonomic networks are networks that are selforganized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure an...
Tao Jiang, John S. Baras
IEEEARES
2008
IEEE
14 years 2 months ago
Finding Evidence of Antedating in Digital Investigations
— Finding evidence of antedating is an important goal in many digital investigations. This paper explores how causality can expose antedating by investigating storage systems for...
Svein Yngvar Willassen
POPL
2005
ACM
14 years 1 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
ICCS
2004
Springer
14 years 1 months ago
Towards OGSA Compatibility in Alternative Metacomputing Frameworks
Abstract. Lately, grid research has focused its attention on interoperability and standards, such as Grid Services, in order to facilitate resource virtualization, and to accommoda...
Gunther Stuer, Vaidy S. Sunderam, Jan Broeckhove
IWDW
2004
Springer
14 years 1 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz