A survey of trust in workflows and relevant contexts
W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
[PDF][PDF] A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments.
PS Chung, CW Liu, MS Hwang - Int. J. Netw. Secur., 2014 - ijns.jalaxy.com.tw
Attribute-based proxy re-encryption (ABPRE) scheme is one of the proxy cryptography,
which can delegate the reencryption capability to the proxy and re-encrypt the encrypted …
which can delegate the reencryption capability to the proxy and re-encrypt the encrypted …
In the relation of workflow and trust characteristics, and requirements in service workflows
W Viriyasitavat, A Martin - International Conference on Informatics …, 2011 - Springer
Abstract Service-based interactions have become common over the past few years.
Nowadays, their applications are visible in several forms including e-commerce, Virtual …
Nowadays, their applications are visible in several forms including e-commerce, Virtual …
[PDF][PDF] A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy.
SF Tzeng, CC Lee, TC Lin - Int. J. Netw. Secur., 2011 - ijns.jalaxy.com.tw
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy Page 1 LETTER
International Journal of Network Security, Vol.12, No.3, PP.178–180, May 2011 178 A Novel …
International Journal of Network Security, Vol.12, No.3, PP.178–180, May 2011 178 A Novel …
A framework of trust in service workflows
W Viriyasitavat - 2013 - ora.ox.ac.uk
The everything as a service concept enables dynamic resource provisions to be seen and
delivered as services. Their proliferation nowadays leads to the creation of new value-added …
delivered as services. Their proliferation nowadays leads to the creation of new value-added …
Security issues in distributed computing system models
GF Elkabbany, M Rasslan - Cyber security and threats: Concepts …, 2018 - igi-global.com
Distributed computing systems allow homogenous/heterogeneous computers and
workstations to act as a computing environment. In this environment, users can uniformly …
workstations to act as a computing environment. In this environment, users can uniformly …
Fine-grained and history-based access control with trust management for autonomic grid services
Grid technology provides an Internet-wide environment where a very large set of entities
share their resources. The main feature of a grid environment is that resource providers …
share their resources. The main feature of a grid environment is that resource providers …
Relays: A new approach for the finite departure problem in overlay networks
C Scheideler, A Setzer - Stabilization, Safety, and Security of Distributed …, 2018 - Springer
A fundamental problem for overlay networks is to safely exclude leaving nodes, ie, the
nodes requesting to leave the overlay network are excluded from it without affecting its …
nodes requesting to leave the overlay network are excluded from it without affecting its …
A SURVEY OF SECURITY THREATS IN DISTRIBUTED OPERATING SYSTEM.
Recently, security in software is becoming complex, especially in distributed computing. A
secured and trusted environment is critically important for distributed computing. Different …
secured and trusted environment is critically important for distributed computing. Different …