Sciweavers

177 search results - page 23 / 36
» Reasoning About Active Network Protocols
Sort
View
IJISEC
2011
71views more  IJISEC 2011»
13 years 1 months ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
CIKM
2009
Springer
14 years 4 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 4 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
HPN
1998
13 years 11 months ago
Differentiated Services: A New Approach for Quality of Service in the Internet
With the grown popularity of the Internet and the increasing use of business and multimedia applications the users' demand for higher and more predictable quality of service ...
Florian Baumgartner, Torsten Braun, Pascal Habegge...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...