Sciweavers

650 search results - page 30 / 130
» Privacy in Non-private Environments
Sort
View
IEEEARES
2006
IEEE
14 years 3 months ago
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems
Distributed object systems for partitionable systems present a challenge, in that there is a trade-off between availability and consistency. Changes in one partition are not visib...
Stefan Beyer, Alexander Sanchez, Francesc D. Mu&nt...
ISPEC
2005
Springer
14 years 3 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 2 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
ACSAC
1998
IEEE
14 years 2 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
ACSAC
2001
IEEE
14 years 1 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...