Sciweavers

319 search results - page 22 / 64
» Denial of Service
Sort
View
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 2 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
ICDCSW
2002
IEEE
14 years 1 months ago
A Collaborative Infrastructure for Scalable and Robust News Delivery
In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-t...
Werner Vogels, Christopher Ré, Robbert van ...
ICICS
1997
Springer
14 years 18 days ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
CSREASAM
2004
13 years 9 months ago
Tolerating Intrusions in Grid Systems
Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be v...
Luis Sardinha, Nuno Ferreira Neves, Paulo Ver&iacu...
ACSAC
2009
IEEE
14 years 3 months ago
SecureMR: A Service Integrity Assurance Framework for MapReduce
—MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service orient...
Wei Wei, Juan Du, Ting Yu, Xiaohui Gu