Sciweavers

5123 search results - page 88 / 1025
» Performance and Security Tradeoff
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
ATAL
2006
Springer
15 years 8 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
ESORICS
2007
Springer
15 years 10 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
USENIX
2004
15 years 5 months ago
Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies
Multihoming is increasingly being employed by large enterprises and data centers as a mechanism to extract good performance from their provider connections. Today, multihomed end-...
Aditya Akella, Srinivasan Seshan, Anees Shaikh
TWC
2010
14 years 11 months ago
Impact of mobile node density on detection performance measures in a hybrid sensor network
We investigate the impact of mobile node density on several detection performance measures for stationary target detection by a hybrid sensor network consisting of both static and ...
Thakshila Wimalajeewa, Sudharman K. Jayaweera