A survey of trust in workflows and relevant contexts

W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …

[PDF][PDF] A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments.

PS Chung, CW Liu, MS Hwang - Int. J. Netw. Secur., 2014 - ijns.jalaxy.com.tw
Attribute-based proxy re-encryption (ABPRE) scheme is one of the proxy cryptography,
which can delegate the reencryption capability to the proxy and re-encrypt the encrypted …

In the relation of workflow and trust characteristics, and requirements in service workflows

W Viriyasitavat, A Martin - International Conference on Informatics …, 2011 - Springer
Abstract Service-based interactions have become common over the past few years.
Nowadays, their applications are visible in several forms including e-commerce, Virtual …

[PDF][PDF] A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.

SF Tzeng, CC Lee, TC Lin - Int. J. Netw. Secur., 2011 - ijns.jalaxy.com.tw
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy Page 1 LETTER
International Journal of Network Security, Vol.12, No.3, PP.178–180, May 2011 178 A Novel …

A framework of trust in service workflows

W Viriyasitavat - 2013 - ora.ox.ac.uk
The everything as a service concept enables dynamic resource provisions to be seen and
delivered as services. Their proliferation nowadays leads to the creation of new value-added …

Security issues in distributed computing system models

GF Elkabbany, M Rasslan - Cyber security and threats: Concepts …, 2018 - igi-global.com
Distributed computing systems allow homogenous/heterogeneous computers and
workstations to act as a computing environment. In this environment, users can uniformly …

Fine-grained and history-based access control with trust management for autonomic grid services

H Koshutanski, F Martinelli, P Mori… - … on Autonomic and …, 2006 - ieeexplore.ieee.org
Grid technology provides an Internet-wide environment where a very large set of entities
share their resources. The main feature of a grid environment is that resource providers …

Relays: A new approach for the finite departure problem in overlay networks

C Scheideler, A Setzer - Stabilization, Safety, and Security of Distributed …, 2018 - Springer
A fundamental problem for overlay networks is to safely exclude leaving nodes, ie, the
nodes requesting to leave the overlay network are excluded from it without affecting its …

A SURVEY OF SECURITY THREATS IN DISTRIBUTED OPERATING SYSTEM.

S Khan, SM Waqas, A Ahmed - I-Manager's Journal on …, 2020 - search.ebscohost.com
Recently, security in software is becoming complex, especially in distributed computing. A
secured and trusted environment is critically important for distributed computing. Different …

[引用][C] 组合Web 服务访问控制技术研究综述

上超望, 赵呈领, 刘清堂, 王艳凤 - 计算机科学, 2011