Sciweavers

2009 search results - page 286 / 402
» A privacy-aware access control system
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 2 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 2 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
ASAP
2008
IEEE
120views Hardware» more  ASAP 2008»
14 years 4 days ago
Lightweight DMA management mechanisms for multiprocessors on FPGA
This paper presents a multiprocessor system on FPGA that adopts Direct Memory Access (DMA) mechanisms to move data between the external memory and the local memory of each process...
Antonino Tumeo, Matteo Monchiero, Gianluca Palermo...
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 10 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang