Sciweavers

483 search results - page 38 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
147
Voted
CCS
2010
ACM
15 years 6 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
131
Voted
IJNSEC
2008
201views more  IJNSEC 2008»
15 years 3 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
CCS
2009
ACM
15 years 10 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
DAWAK
2006
Springer
15 years 7 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
137
Voted
ICTAC
2009
Springer
15 years 1 months ago
Automatic Conflict Detection on Contracts
Abstract. Many software applications are based on collaborating, yet competing, agents or virtual organisations exchanging services. Contracts, expressing obligations, permissions ...
Stephen Fenech, Gordon J. Pace, Gerardo Schneider