Sciweavers

5123 search results - page 139 / 1025
» Performance and Security Tradeoff
Sort
View
JSS
2006
169views more  JSS 2006»
15 years 4 months ago
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on se...
Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matj...
CHI
2006
ACM
16 years 5 months ago
Biasing response in Fitts' Law tasks
Fitts' law, relating the time to acquire a target to the target size and the distance from the target, is an effective and widely used predictor of performance in feedback co...
Emory Al-Imam, Edward Lank
INFOCOM
2005
IEEE
15 years 10 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
WETICE
1996
IEEE
15 years 8 months ago
An enterprise assurance framework
This paper explores generating and conveying confidence in enterprise security. An enterprise assurance framework provides a structure enterprise assurance evidence that strengthe...
Douglas J. Landoll, Jeffrey R. Williams
HOTDEP
2008
126views Hardware» more  HOTDEP 2008»
15 years 7 months ago
Toward Quantifying System Manageability
Manageability directly influences a system's reliability, availability, security, and safety, thus being a key ingredient of system dependability. Alas, we do not have today ...
George Candea