Sciweavers

377 search results - page 18 / 76
» Protection mechanisms for application service hosting platfo...
Sort
View
E2EMON
2006
IEEE
14 years 1 months ago
Implementation and evaluation of an inline network measurement algorithm and its application to TCP-based service
Abstract— In our previous studies, we proposed ImTCP, an inline network measurement technique that can obtain available bandwidth information of the network path between sender a...
Tomoaki Tsugawa, Go Hasegawa, Masayuki Murata
PUC
2008
137views more  PUC 2008»
13 years 7 months ago
Middleware support for the deployment of ubiquitous software components
A number of emerging distributed platforms include xed and robust workstations but, like dynamic and pervasive networks, are often built from mobile and resource-constrained device...
Didier Hoareau, Yves Mahéo
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 1 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
FOSAD
2005
Springer
14 years 1 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay