Sciweavers

318 search results - page 9 / 64
» A New Perspective on Internet Security using Insurance
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 8 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
TRIDENTCOM
2010
IEEE
13 years 6 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
DAIS
2009
13 years 9 months ago
Distributed Contracting and Monitoring in the Internet of Services
Abstract. The recent approval of the EU Services Directive is fostering the Internet of Services (IoS) and will promote the emergence of marketplaces for business and real-world se...
Josef Spillner, Matthias Winkler, Sandro Reichert,...