Sciweavers

505 search results - page 45 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CN
2004
129views more  CN 2004»
13 years 7 months ago
Dynamic traffic controls for Web-server networks
Distributed Web-server systems have been widely used to provide effective Internet services. The management of these systems requires dynamic controls of the Web traffic. With the...
Liming Liu, Yumao Lu
ACSC
2004
IEEE
13 years 11 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ISCC
1999
IEEE
121views Communications» more  ISCC 1999»
14 years 4 days ago
Customer Service Management: Towards a Management Information Base for an IP Connectivity Service
Customer Service Management (CSM) offers a management interface between customer and service provider, which enables customers to individually monitor and control their subscribed...
Michael Langer, Stefan Loidl, Michael Nerb
DEXAW
2003
IEEE
164views Database» more  DEXAW 2003»
14 years 1 months ago
Towards an Open Service Architecture for Data Mining on the Grid
Across a wide variety of fields, huge datasets are being collected and accumulated at a dramatical pace. The datasets addressed by individual applications are very often heteroge...
Peter Brezany, Jürgen Hofer, Alexander Wö...