Sciweavers

838 search results - page 23 / 168
» An Architecture for Network Layer Privacy
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
COMSWARE
2006
IEEE
14 years 2 months ago
FACTS - A rule-based middleware architecture for wireless sensor networks
ing a middleware abstraction layer into wireless sensor networks is a widely accepted solution to facilitate application programming and allow network organization. In this paper,...
Kirsten Terfloth, Georg Wittenburg, Jochen H. Schi...
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 1 days ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.
NOMS
2000
IEEE
144views Communications» more  NOMS 2000»
14 years 26 days ago
Managing application services over service provider networks: architecture and dependency analysis
This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors’ experience with the IBM Global Network. It describes how one can e...
Gautam Kar, Alexander Keller, Seraphin B. Calo
ACSAC
1998
IEEE
14 years 22 days ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle