Sciweavers

327 search results - page 42 / 66
» Integrated Risk Analysis for a Commercial Computing Service
Sort
View
DKE
2011
260views Education» more  DKE 2011»
12 years 11 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
HUC
2005
Springer
14 years 28 days ago
Scanning Objects in the Wild: Assessing an Object Triggered Information System
We describe the results of a field deployment of the AURA system which links online content to physical objects through machine readable tags. AURA runs on commercially available p...
A. J. Bernheim Brush, Tammara Combs Turner, Marc A...
MSWIM
2004
ACM
14 years 25 days ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl