Chothia et al., 2004
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US8086744B2 (en) | Meta-protocol | |
| Gong | JXTA: A network programming environment | |
| De Laat et al. | Generic AAA architecture | |
| Braumandl et al. | ObjectGlobe: Ubiquitous query processing on the Internet | |
| US7159125B2 (en) | Policy engine for modular generation of policy for a flat, per-device database | |
| Blaze et al. | Experience with the keynote trust management system: Applications and future directions | |
| CN112514319A (en) | System and method for supporting SQL-based rich queries in a hyper-ledger architecture blockchain | |
| Poslad et al. | Towards improved trust and security in FIPA agent platforms | |
| Abadi et al. | Secure implementation of channel abstractions | |
| Yemini et al. | NESTOR: An architecture for network self-management and organization | |
| Flenner | Java P2P unleashed | |
| Lesniewski-Laas et al. | Alpaca: extensible authorization for distributed services | |
| US20040059704A1 (en) | Self-managing computing system | |
| Guttman et al. | Programming cryptographic protocols | |
| Beck et al. | An end-to-end approach to globally scalable programmable networking | |
| Cachin | Integrity and consistency for untrusted services | |
| van't Noordende et al. | Security in a mobile agent system | |
| Chothia et al. | An architecture for secure fault-tolerant global applications | |
| Laat et al. | RFC2903: Generic AAA architecture | |
| Mennie | An architecture to support dynamic composition of service components and its applicability to Internet security. | |
| Duggan | Cryptographic types | |
| Ioannidis et al. | Design and implementation of virtual private services | |
| Lang | Access policies for middleware | |
| Lang et al. | Verifiable identifiers in middleware security | |
| CN118839326B (en) | Function calling method, device, equipment, medium and program product |