Sciweavers

630 search results - page 84 / 126
» Acceptable internet use policy
Sort
View
IMC
2010
ACM
13 years 5 months ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
ESOP
2004
Springer
14 years 1 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 5 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
MANSCI
2008
169views more  MANSCI 2008»
13 years 7 months ago
Service Adoption and Pricing of Content Delivery Network (CDN) Services
Content Delivery Networks (CDNs) are a vital component of the Internet's content delivery value chain, servicing nearly a third of the Internet's most popular content si...
Kartik Hosanagar, John C.-I. Chuang, Ramayya Krish...
RULEML
2007
Springer
14 years 1 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen