Sciweavers

44 search results - page 7 / 9
» Portable Resource Control in Java: The J-SEAL2 Approach
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 23 days ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
AINA
2007
IEEE
14 years 2 months ago
Database-Driven Grid Computing with GridBASE
The GridBASE framework for database-driven grid computing is presented. The design and a prototype implementation of the framework is discussed. Industry-strength database technol...
Hans De Sterck, Chen Zhang, Aleks Papo
ESORICS
2000
Springer
14 years 5 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
HPCN
1998
Springer
14 years 24 days ago
DISCWorld: A Distributed High Performance Computing Environment
An increasing number of science and engineering applications require distributed and parallel computing resources to satisfy user response-time requirements. Distributed science a...
Kenneth A. Hawick, Heath A. James, Craig J. Patten...
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
14 years 3 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...