Sciweavers

107 search results - page 4 / 22
» Security in a Model for Long-running Transactions
Sort
View
ISCAPDCS
2004
13 years 8 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
ISW
2000
Springer
13 years 11 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
IJNSEC
2007
127views more  IJNSEC 2007»
13 years 7 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan
ACMICEC
2004
ACM
162views ECommerce» more  ACMICEC 2004»
14 years 25 days ago
Balanced matching of buyers and sellers in e-marketplaces: the barter trade exchange model
In this paper, we describe the operation of barter trade exchanges by identifying key techniques used by trade brokers to stimulate trade and satisfy member needs, and present alg...
Peter Haddawy, Namthip Rujikeadkumjorn, Khaimook D...
ACSAC
1999
IEEE
13 years 11 months ago
Transactions in Java Card
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
Marcus Oestreicher