Sciweavers

8772 search results - page 1662 / 1755
» Business Services Networks
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ACSAC
2003
IEEE
14 years 3 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
HICSS
2003
IEEE
178views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Contract and Rights Management Framework Design for Interacting Brokers
Contract and rights management – and thus property rights protection – has gained increasing importance as a quality standard in brokerage and electronic commerce environments...
Susanne Guth, Bernd Simon, Uwe Zdun
IAW
2003
IEEE
14 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
ICALT
2003
IEEE
14 years 3 months ago
Mobile Learning: A New Paradigm in Electronic Learning
As mobile phone becomes popular in the society and many people can afford the cost, the demand of mobility is extended to teaching and learning purposes. One recent and significan...
Chi-Hong Leung, Yuen-Yan Chan
« Prev « First page 1662 / 1755 Last » Next »