Sciweavers

1185 search results - page 113 / 237
» Coupon replication systems
Sort
View
IWIA
2005
IEEE
14 years 3 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
NDSS
2003
IEEE
14 years 3 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
P2P
2002
IEEE
103views Communications» more  P2P 2002»
14 years 3 months ago
Request Algorithms in Freenet-Style Peer-to-Peer Systems
In most peer-to-peer systems, edge resources self-organize into overlay networks. At the core of Freenet-style peer-to-peer systems are insert and request algorithms that dynamica...
Jens Mache, Melanie Gilbert, Jason Guchereau, Jeff...
AP2PC
2005
Springer
14 years 3 days ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
CLUSTER
2005
IEEE
14 years 2 days ago
SymbioticSphere: Towards an Autonomic Grid Network System
This paper describes SymbioticSphere, a novel biologically-inspired architecture that allows grid systems (application services and middleware platforms) to be scalable and adapti...
Paskorn Champrasert, Chonho Lee, Junichi Suzuki