[go: up one dir, main page]

Pallickara et al., 2007 - Google Patents

A scalable approach for the secure and authorized tracking of the availability of entities in distributed systems

Pallickara et al., 2007

View PDF
Document ID
11018911931693207279
Author
Pallickara S
Ekanayake J
Fox G
Publication year
Publication venue
2007 IEEE International Parallel and Distributed Processing Symposium

External Links

Snippet

As the scale and proliferation of distributed applications continues to increase a need often arises to track the availability of entities that comprise the distributed system. An entity that is part of such a distributed system could be a resource, a service that provides a set of …
Continue reading at websrv.cecs.uci.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Fedrecheski et al. Self-sovereign identity for IoT environments: a perspective
Misra et al. AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge
WO2019184924A1 (en) Identity management method, equipment, communication network, and storage medium
US6684331B1 (en) Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
Esposito et al. On security in publish/subscribe services: A survey
Bao et al. A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance
Calabretta et al. MQTT-auth: a token-based solution to endow MQTT with authentication and authorization capabilities
Nichols Lessons learned building a secure network measurement framework using basic NDN
US20060085637A1 (en) Authentication system and method
EP3633949A1 (en) Method and system for performing ssl handshake
CN113556363A (en) Data sharing method and system based on decentralized and distributed proxy re-encryption
Pallickara et al. A framework for secure end-to-end delivery of messages in publish/subscribe systems
Buccafurri et al. Mqtt-i: achieving end-to-end data flow integrity in mqtt
Shang et al. NDN-ACE: Access control for constrained environments over named data networking
Sicari et al. Internet of Things: Security in the keys
Bao et al. A lightweight privacy‐preserving scheme with data integrity for smart grid communications
Grissa et al. Anonymous dynamic spectrum access and sharing mechanisms for the CBRS band
Liu et al. Rumor riding: Anonymizing unstructured peer-to-peer systems
Coileáin et al. Accounting and accountability in content distribution architectures: a survey
WO2019165330A1 (en) System and methods for proof of network element
Li et al. Efficient and fault‐diagnosable authentication architecture for AMI in smart grid
Xiong et al. An anonymous authentication protocol with delegation and revocation for content delivery networks
Zhang et al. AC-SDVN: an access control protocol for video multicast in software defined vehicular networks
Li et al. MACT: A multi-channel anonymous consensus based on Tor
Sultan et al. NDN-RBE: An accountable privacy aware access control framework for NDN