Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...