Pallickara et al., 2007 - Google Patents
A scalable approach for the secure and authorized tracking of the availability of entities in distributed systemsPallickara et al., 2007
View PDF- Document ID
- 11018911931693207279
- Author
- Pallickara S
- Ekanayake J
- Fox G
- Publication year
- Publication venue
- 2007 IEEE International Parallel and Distributed Processing Symposium
External Links
Snippet
As the scale and proliferation of distributed applications continues to increase a need often arises to track the availability of entities that comprise the distributed system. An entity that is part of such a distributed system could be a resource, a service that provides a set of …
- 230000002708 enhancing 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fedrecheski et al. | Self-sovereign identity for IoT environments: a perspective | |
Misra et al. | AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge | |
WO2019184924A1 (en) | Identity management method, equipment, communication network, and storage medium | |
US6684331B1 (en) | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure | |
Esposito et al. | On security in publish/subscribe services: A survey | |
Bao et al. | A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance | |
Calabretta et al. | MQTT-auth: a token-based solution to endow MQTT with authentication and authorization capabilities | |
Nichols | Lessons learned building a secure network measurement framework using basic NDN | |
US20060085637A1 (en) | Authentication system and method | |
EP3633949A1 (en) | Method and system for performing ssl handshake | |
CN113556363A (en) | Data sharing method and system based on decentralized and distributed proxy re-encryption | |
Pallickara et al. | A framework for secure end-to-end delivery of messages in publish/subscribe systems | |
Buccafurri et al. | Mqtt-i: achieving end-to-end data flow integrity in mqtt | |
Shang et al. | NDN-ACE: Access control for constrained environments over named data networking | |
Sicari et al. | Internet of Things: Security in the keys | |
Bao et al. | A lightweight privacy‐preserving scheme with data integrity for smart grid communications | |
Grissa et al. | Anonymous dynamic spectrum access and sharing mechanisms for the CBRS band | |
Liu et al. | Rumor riding: Anonymizing unstructured peer-to-peer systems | |
Coileáin et al. | Accounting and accountability in content distribution architectures: a survey | |
WO2019165330A1 (en) | System and methods for proof of network element | |
Li et al. | Efficient and fault‐diagnosable authentication architecture for AMI in smart grid | |
Xiong et al. | An anonymous authentication protocol with delegation and revocation for content delivery networks | |
Zhang et al. | AC-SDVN: an access control protocol for video multicast in software defined vehicular networks | |
Li et al. | MACT: A multi-channel anonymous consensus based on Tor | |
Sultan et al. | NDN-RBE: An accountable privacy aware access control framework for NDN |