Sciweavers

338 search results - page 54 / 68
» Operational Models for Reputation Servers
Sort
View
CCS
2004
ACM
14 years 28 days ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
GI
2004
Springer
14 years 28 days ago
Contractual Relationships in Open Source Structures
: The article provides an overview of the legal relationships in Open Source Structures. It shows that – as within all software development and distribution models – different ...
Carsten Schulz
HIM
1997
Springer
144views Multimedia» more  HIM 1997»
13 years 11 months ago
DIANE - Hypermedia Documents in a Distributed Annotation Environment
The project DIANE is an EU-funded project in the ACTS Program and started in September 1995. The goal of DIANE is to establish a service, which enables an user to annotate anythin...
Hartmut Benz, Steffen Fischer, Rolf Mecklenburg, G...
EDCC
1994
Springer
13 years 11 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
AOSD
2007
ACM
13 years 11 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...