Sciweavers

483 search results - page 35 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
141
Voted
MHCI
2005
Springer
15 years 9 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
145
Voted
DBSEC
2006
134views Database» more  DBSEC 2006»
15 years 4 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
NOSSDAV
2005
Springer
15 years 9 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
ACSAC
2000
IEEE
15 years 8 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
138
Voted
MOBISYS
2006
ACM
16 years 3 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...