Sciweavers

483 search results - page 44 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
203
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 7 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
152
Voted
WISE
2010
Springer
15 years 1 months ago
Towards Flexible Mashup of Web Applications Based on Information Extraction and Transfer
Mashup combines information or functionality from two or more existing Web sources to create a new Web page or application. The Web sources that are used to build mashup applicatio...
Junxia Guo, Hao Han, Takehiro Tokuda
EURONGI
2006
Springer
15 years 7 months ago
Self-protection in P2P Networks: Choosing the Right Neighbourhood
Abstract. In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and f...
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, ...
139
Voted
SEMWEB
2007
Springer
15 years 9 months ago
An Event-Based Approach for Semantic Metadata Interoperability
Abstract. This paper presents a method for making metadata conforming to heterogeneous schemas semantically interoperable. The idea is to make the knowledge embedded in the schema ...
Tuukka Ruotsalo, Eero Hyvönen
USENIX
2007
15 years 5 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...