Sciweavers

1040 search results - page 89 / 208
» Privacy for Telecom Services
Sort
View
ACSAC
2002
IEEE
14 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
CCS
2006
ACM
14 years 27 days ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
SICHERHEIT
2010
13 years 7 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
MA
2001
Springer
98views Communications» more  MA 2001»
14 years 1 months ago
A Scalable and Secure Global Tracking Service for Mobile Agents
In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile a...
Volker Roth, Jan Peters