Sciweavers

1016 search results - page 34 / 204
» Peering Peer-to-Peer Providers
Sort
View
SOCA
2008
IEEE
13 years 8 months ago
Specification of realizable service conversations using collaboration diagrams
Specification, modeling and analysis of interactions among peers that communicate via messages are becoming increasingly important due to the emergence of service oriented computi...
Tevfik Bultan, Xiang Fu
CISIS
2009
IEEE
14 years 3 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CSE
2009
IEEE
14 years 3 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...
FLAIRS
2007
13 years 10 months ago
Accessing XML Documents Using Semantic Meta Data in a P2P Environment
XGR (XML Data Grid) and BabelPeers are both data management systems based on distributed hash tables (DHT) that use the Pastry DHT to store data and meta data. XGR is based on the...
Dominic Battré, Felix Heine, André H...
ACSAC
2010
IEEE
13 years 4 days ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon