Sciweavers

163 search results - page 24 / 33
» Framework for Decentralizing Legacy Applications
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
PODC
2011
ACM
12 years 10 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
ATAL
2004
Springer
14 years 1 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
HPDC
2008
IEEE
14 years 2 months ago
DataLab: transactional data-parallel computing on an active storage cloud
Active storage clouds are an attractive platform for executing large data intensive workloads found in many fields of science. However, active storage presents new system managem...
Brandon Rich, Douglas Thain
IIWAS
2008
13 years 9 months ago
Cross-domain information and service interoperability
The growing trends towards integrating legacy applications with new systems in a network-centric environment has introduced yet another level of complexity beyond those we witness...
Kamran Sartipi, Azin Dehmoobad