Sciweavers

472 search results - page 82 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
CCS
2000
ACM
13 years 11 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
NDSS
2007
IEEE
14 years 1 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
COORDINATION
2007
Springer
14 years 1 months ago
Fact Spaces: Coordination in the Face of Disconnection
Coordination languages for ad hoc networks with a fluid topology do not offer adequate support to detect and deal with device disconnection. Such a disconnection is particularly ...
Stijn Mostinckx, Christophe Scholliers, Eline Phil...
PPOPP
2003
ACM
14 years 26 days ago
CC-MPI: a compiled communication capable MPI prototype for ethernet switched clusters
Compiled communication has recently been proposed to improve communication performance for clusters of workstations. The idea of compiled communication is to apply more aggressive...
Amit Karwande, Xin Yuan, David K. Lowenthal