Sciweavers

1229 search results - page 181 / 246
» Trusted Computing
Sort
View
DSN
2002
IEEE
14 years 1 months ago
Distributed Object Middleware to Support Dependable Information Sharing between Organisations
Organisations increasingly use the Internet to offer their own services and to utilise the services of others. This naturally leads to information sharing across organisational bo...
Nick Cook, Santosh K. Shrivastava, Stuart M. Wheat...
DSN
2009
IEEE
14 years 26 days ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 22 days ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ESCIENCE
2006
IEEE
14 years 20 days ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
PUC
2006
72views more  PUC 2006»
13 years 9 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon