scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 1994"


Journal ArticleDOI
TL;DR: SESAME (Secure European System for Applications in a Multivendor Environment), a security architecture for open distributed systems developed by Bull, ICL and Siemens Nixdorf, is described, showing its efficiency with regard to performance and administration and its security qualities.

79 citations


Journal ArticleDOI
TL;DR: This paper argues that it is preferable to select a set of standard source models rather than a single such model, and defines aSet of criteria to be used in the selection, and choose appropriate source models accordingly.

54 citations


Journal ArticleDOI
TL;DR: This paper calculates burst blocking probabilities by means of a recursive relation that considerably simplifies the complexity of the problem and supply the analytical basis for an admission control mechanism that guarantees a predefined performance threshold for the classes of traffic supported.

45 citations


Journal ArticleDOI
TL;DR: A survey of modern key agreement techniques, and distinguishing characteristics, including identity (entity) authentication, implicit key authentication, key confirmation and key freshness are presented.

42 citations


Journal ArticleDOI
TL;DR: A survey of multimedia applications research is provided, and its contribution to the understanding of distributed multimedia applications is assessed.

35 citations


Journal ArticleDOI
TL;DR: An efficient solution to the problem of accommodating aLatecomer is found by recording the modifications to the window system's state implied in the series of commands generated by the applications, and later imposing these state modifications on a latecomer's window system.

33 citations


Journal ArticleDOI
Y. Ni1, A.M Goscinski1
TL;DR: This paper demonstrates that it is possible to build a trading service which allows users to access objects of remote distributed systems and shows how location transparency can be achieved by cooperation between traders based on attribute names, and that the use of attributes has the potential to make resource sharing effective and efficient.

28 citations


Journal ArticleDOI
TL;DR: This paper addresses the problem of selecting a route for every pair of communicating nodes in a packet-switched communication network in order to minimize the average delay encountered by messages with an efficient solution procedure based on a Lagrangean relaxation.

27 citations


Journal ArticleDOI
TL;DR: The paper proposes a design for a security system which is based on use of Kerberos in each domain, which is extended with several additional security functions: extended access control lists, delegation properties and smart cards.

21 citations


Journal ArticleDOI
TL;DR: The need for the collaboration of managers in cooperative applications where the federative application context must be harmonized with the hierarchical component environment is described and a cooperative management concept is introduced which augments existing hierarchical management policies and procedures.

15 citations


Journal ArticleDOI
TL;DR: It is found that the effect of interprocessor communication and fault tolerance on the response time for communication-extensive programs (I/O bound) is more than that for computation-ext extensive programs (CPU bound).

Journal ArticleDOI
TL;DR: This paper presents a groupware system called TeamBuilder aimed at supporting team formation and the intended benefit of the proposed decentralized infrastructure is the fostering of the participation of many individuals and organizations in information sharing by seamless transitions between individual and cooperative work at the user interface and networking level.

Journal ArticleDOI
TL;DR: The SKIPJACK algorithm, escrowed encryption chip, encrypting with the chip, law enforcement access and an enhanced chip that includes algorithms for computing digital signatures and negotiating session keys are described in this article.

Journal ArticleDOI
TL;DR: An application of high-speed wide area networks, viz. that of distributed database systems (DDBS), and the description of a new CC protocol called 'send-on-demand', which performs very well in a read-oriented environment, and the performance of four concurrency control schemes is compared.

Journal ArticleDOI
Son T. Vuong1, H Janssen1, Y Lu1, C Mathieson1, B Do1 
TL;DR: The environment will serve as a useful test-bed for experimenting with test generation and selection, as well as being a productive system for generating useful test suites for real-life protocols such as the OSI transport and session layer protocols.

Journal ArticleDOI
TL;DR: A dynamic multi-path algorithm that has been considered for connection oriented asynchronous transfer mode (ATM) networks that takes advantage of a cell multiplexing capability that has particular advantage in networks supporting variable bit rate (VBR) traffic.

Journal ArticleDOI
TL;DR: The features of a Generic Security Service Application Program Interface (GSS-API) are described, its underlying assumptions are examined, and lessons learned during its evolution are evaluated.

Journal ArticleDOI
TL;DR: The main feature of the proposed scheme is that it can be used in general DMISs where the inter-media relationships are complex and the media data is stored in more than one server in the network.

Journal ArticleDOI
TL;DR: This paper examines how performance problems can be resolved by combining the information available to agents that minitor end-to-end QoS performance and shows that a central management system is capable of identifying the cause of performance degradation quickly.

Journal ArticleDOI
TL;DR: It is found that the areas crucial to efficient encoder and decoder implementations are memory management, buffer management and the overall simplicity of the encoding rules.

Journal ArticleDOI
TL;DR: A simulation study has shown that the proposed congestion control protocols yield higher bridge throughput efficiency for both voice and data traffic with minimum protocol overhead.

Journal ArticleDOI
A Santos1, B Tritsch1
TL;DR: The decisions made during the conceptualization of a cooperative multimedia editing tool, which enables co-authors to cooperatively produce multimedia documents, are described and sustained to enhance inter-user communication.

Journal ArticleDOI
TL;DR: This paper describes the verification of a real life protocol, the ISO Association Control Service Element (ACSE), specified in Estelle, which is verified by a proven automated verification tool, PROTEAN.

Journal ArticleDOI
TL;DR: The requirements for EDI security, and how these requirements are being met are examined.

Journal ArticleDOI
TL;DR: By applying the scheme presented one can send a confidential message to a group of users such that the message can be revealed only when the specified members cooperatively work together.

Journal ArticleDOI
TL;DR: This work examines two key aspects of security management, managing user security services and providing security to network management systems, to give the reader an overview of the state-of-the-art in security management.

Journal ArticleDOI
TL;DR: A Communications Services Architecture for Computer Supported Cooperative Work is described, which incorporates media processing, data transport, notification and monitoring services, and multipoint communications.

Journal ArticleDOI
TL;DR: A delegation scheme based on an adapted ZS-3 public key cryptosystem that attains a level of security against internal and external attacks, which is equivalent to the solving of instances of the discrete logarithm problem, thus making it an attractive candidate for delegations in distributed systems from the point of view of security.

Journal ArticleDOI
TL;DR: Using a synthesis approach, an 'effective bandwidth' is defined and calculated for on-off ATM sources, which can be used as a connection acceptance criterion in ATM networks, thus leading to high utilization of ATM network resources.

Journal ArticleDOI
TL;DR: QMTP is designed, a new multicast transport protocol that provides a simplex (unidirectional), rate controlled, quasireliable multicasts transport mechanism for large scale dissemination of multimedia information.