咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 12 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 36 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 31 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 36 篇 distributed syst...
  • 4 篇 access control
  • 4 篇 security pattern...
  • 4 篇 security and pri...
  • 4 篇 security solutio...
  • 3 篇 secure software ...
  • 3 篇 security methodo...
  • 2 篇 threat patterns
  • 2 篇 authentication
  • 2 篇 security protoco...
  • 2 篇 applied computin...
  • 2 篇 security
  • 2 篇 blockchain
  • 2 篇 network security
  • 2 篇 security policie...
  • 2 篇 cloud security
  • 2 篇 privacy
  • 2 篇 language-based s...
  • 1 篇 decentralized le...
  • 1 篇 computer science

机构

  • 3 篇 univ adelaide sc...
  • 3 篇 florida atlantic...
  • 1 篇 global noticeboa...
  • 1 篇 data secur techn...
  • 1 篇 york univ sch in...
  • 1 篇 aristaflow gmbh ...
  • 1 篇 interdisciplinar...
  • 1 篇 univ arizona tuc...
  • 1 篇 inesc tec porto
  • 1 篇 univ malaga dept...
  • 1 篇 colorado state u...
  • 1 篇 cnr ist informat...
  • 1 篇 univ kassel appl...
  • 1 篇 ecole polytech c...
  • 1 篇 consiglio nazion...
  • 1 篇 monash univ melb...
  • 1 篇 hong kong univ s...
  • 1 篇 nexar inc ny usa
  • 1 篇 karlsruhe inst t...
  • 1 篇 department of co...

作者

  • 3 篇 uzunov anton v.
  • 3 篇 falkner katrina
  • 3 篇 fernandez eduard...
  • 1 篇 portela bernardo
  • 1 篇 lin xiaodong
  • 1 篇 ng siaw-lynn
  • 1 篇 gritti armando p...
  • 1 篇 pan lei
  • 1 篇 hartel pieter
  • 1 篇 sakurai k
  • 1 篇 eduardo b. ferna...
  • 1 篇 arden owen
  • 1 篇 jorge pedro
  • 1 篇 mueller guenter
  • 1 篇 brosh eli
  • 1 篇 clark thomborson
  • 1 篇 wright rn
  • 1 篇 gan rundong
  • 1 篇 putz benedikt
  • 1 篇 xue liang

语言

  • 36 篇 英文
检索条件"主题词=distributed systems security"
36 条 记 录,以下是1-10 订阅
排序:
security solution frames and security patterns for authorization in distributed, collaborative systems
收藏 引用
COMPUTERS & security 2015年 55卷 193-234页
作者: Uzunov, Anton V. Fernandez, Eduardo B. Falkner, Katrina Univ Adelaide Sch Comp Sci Adelaide SA 5005 Australia Florida Atlantic Univ Dept Comp & Elect Engn & Comp Sci Boca Raton FL 33431 USA
The design of an authorization infrastructure is one of the most important aspects of engineering a secure software system. Unlike other system types, distributed systems - and especially distributed collaborative sys... 详细信息
来源: 评论
ASE: A comprehensive pattern-driven security methodology for distributed systems
收藏 引用
COMPUTER STANDARDS & INTERFACES 2015年 41卷 112-137页
作者: Uzunov, Anton V. Fernandez, Eduardo B. Falkner, Katrina Univ Adelaide Sch Comp Sci Adelaide SA 5005 Australia Florida Atlantic Univ Dept Comp & Elect Engn & Comp Sci Boca Raton FL 33431 USA
Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of... 详细信息
来源: 评论
A Comprehensive Pattern-Driven security Methodology for distributed systems
A Comprehensive Pattern-Driven Security Methodology for Dist...
收藏 引用
23rd Australasian Software Engineering Conference (ASWEC)
作者: Uzunov, Anton V. Falkner, Katrina Fernandez, Eduardo B. Univ Adelaide Sch Comp Sci Adelaide SA 5005 Australia Florida Atlantic Univ Dept Comp & Elect Engn & Comp Sci Boca Raton FL 33431 USA
Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of... 详细信息
来源: 评论
The Last Survivor of PoS Pools: Staker's Dilemma
收藏 引用
PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING systems 2025年 第1期9卷 1-29页
作者: Huang, Yuming Tang, Jing Cong, Qianhao Ma, Richard T. B. Chen, Lei Chee, Yeow Meng Natl Univ Singapore Singapore Singapore Hong Kong Univ Sci & Technol Guangzhou Peoples R China
In blockchains using the Proof-of-Work (PoW) consensus mechanism, a mining pool is a joint group of miners who combine their computational resources and share the generated revenue. Similarly, when the Proof-of-Stake ... 详细信息
来源: 评论
A Comprehensive Pattern-Driven security Methodology for distributed systems
A Comprehensive Pattern-Driven Security Methodology for Dist...
收藏 引用
Australian Software Engineering Conference
作者: Anton V. Uzunov Katrina Falkner Eduardo B. Fernandez School of Computer Science The University of Adelaide Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University
Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of... 详细信息
来源: 评论
End-to-End security for distributed Event-driven Enclave Applications on Heterogeneous TEEs
收藏 引用
ACM TRANSACTIONS ON PRIVACY AND security 2023年 第3期26卷 1-46页
作者: Scopelliti, Gianluca Pouyanrad, Sepideh Noorman, Job Alder, Fritz Baumann, Christoph Piessens, Frank Muhlberg, Jan Tobias Ericsson AB Stockholm Sweden DistriNet Imec Ghent Belgium Katholieke Univ Leuven B-3001 Leuven Belgium Ecole Polytech BEAM B-1050 Brussels Belgium Ecole Polytech Cybersecur Res Ctr B-1050 Brussels Belgium Univ Libre Bruxelles B-1050 Brussels Belgium
This article presents an approach to provide strong assurance of the secure execution of distributed eventdriven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon a... 详细信息
来源: 评论
Integrating PMI services in CORBA applications
收藏 引用
COMPUTER STANDARDS & INTERFACES 2003年 第4期25卷 391-409页
作者: Lòpez, J Maña, A Ortega, JJ Troya, JM Yagüe, MI Univ Malaga Dept Comp Sci Malaga 29017 Spain
Application-level access control is an important requirement in many distributed environments. For instance, in new scenarios such as e-commerce, access to resources by previously unknown users is an essential problem... 详细信息
来源: 评论
An authentication logic with formal semantics supporting synchronization, revocation, and recency
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2002年 第3期28卷 256-285页
作者: Stubblebine, SG Wright, RN Stubblebine Consulting LLC Madison NJ 07940 USA AT&T Labs Res Florham Pk NJ 07932 USA
distributed systems inherently involve dynamic changes to the value of security-relevant attributes such as the goodness of encryption keys, trustworthiness of participants, and synchronization between principals. Sin... 详细信息
来源: 评论
Untargeted Poisoning Attack Detection in Federated Learning via Behavior AttestationAl
收藏 引用
IEEE ACCESS 2023年 11卷 125064-125079页
作者: Mallah, Ranwa Al Lopez, David Badu-Marfo, Godwin Farooq, Bilal Royal Mil Coll Kingston Kingston ON K7K 7B4 Canada Univ Nacl Autonoma Mexico Inst Ingeneria Mexico City 04510 Mexico Toronto Metropolitan Univ Lab Innovat Transportat Toronto ON M5G 1G3 Canada
Federated Learning (FL) is a paradigm in Machine Learning (ML) that addresses data privacy, security, access rights and access to heterogeneous information issues by training a global model using distributed nodes. De... 详细信息
来源: 评论
Exposing Stealthy Wash Trading on Automated Market Maker Exchanges
收藏 引用
ACM TRANSACTIONS ON INTERNET TECHNOLOGY 2024年 第4期24卷 1-30页
作者: Gan, Rundong Wang, Le Xue, Liang Lin, Xiaodong Univ Guelph Sch Comp Sci Guelph ON Canada York Univ Sch Informat Technol Toronto ON Canada Univ Guelph Guelph ON Canada
Decentralized Finance (DeFi), a pivotal component of the emerging Web3 landscape, is gaining popularity but remains vulnerable to market manipulations, such as wash trading. Wash trading is an illegal practice, where ... 详细信息
来源: 评论