Sciweavers

712 search results - page 5 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
TCSV
2008
298views more  TCSV 2008»
13 years 7 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
ACMSE
2006
ACM
14 years 1 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
CISIS
2009
IEEE
14 years 2 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
GLOBECOM
2008
IEEE
14 years 1 months ago
Trust Credential Distribution in Autonomic Networks
Abstract—Autonomic networks are networks that are selforganized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure an...
Tao Jiang, John S. Baras
ICSE
2007
IEEE-ACM
14 years 7 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...