Sciweavers

2187 search results - page 332 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
VLDB
2007
ACM
119views Database» more  VLDB 2007»
14 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
FCSC
2010
92views more  FCSC 2010»
13 years 7 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 3 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
AOSD
2005
ACM
14 years 2 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
HICSS
2005
IEEE
165views Biometrics» more  HICSS 2005»
14 years 2 months ago
A QoS Based Model for Supporting Multimedia Applications over Cellular IP
With the increasing use of real-time multimedia applications over IP networks, efficient use of resources, especially in wireless networks, is becoming a necessity. In order to ha...
Elwalid Sidahmed, Hesham H. Ali