Sciweavers

77 search results - page 14 / 16
» Protecting Mobile Agents Against Malicious Hosts
Sort
View
ATAL
2003
Springer
13 years 12 months ago
Detecting deception in reputation management
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
Bin Yu, Munindar P. Singh
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 21 days ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ATAL
2004
Springer
13 years 10 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
CN
2007
99views more  CN 2007»
13 years 6 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
WWW
2005
ACM
14 years 7 months ago
WebPod: persistent Web browsing sessions with pocketable storage devices
We present WebPod, a portable system that enables mobile users to use the same persistent, personalized web browsing session on any Internet-enabled device. No matter what compute...
Shaya Potter, Jason Nieh