Sciweavers

2904 search results - page 58 / 581
» Internet Infrastructure Security
Sort
View
CEAS
2005
Springer
14 years 3 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
IFIP
2010
Springer
13 years 4 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
IC
2004
13 years 11 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz
JDCTA
2008
160views more  JDCTA 2008»
13 years 10 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
ICDIM
2008
IEEE
14 years 4 months ago
Towards e-Government: The security SOA approach of the University of Murcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university c...
Daniel Sánchez-Martínez, C. Inmacula...