Sciweavers

1630 search results - page 47 / 326
» Secure Overlay Network Design
Sort
View
BCS
2008
14 years 18 days ago
Overcoming Software Fragility with Interacting Feedback Loops and Reversible Phase Transitions
Programs are fragile for many reasons, including software errors, partial failures, and network problems. One way to make software more robust is to design it from the start as a ...
Peter Van Roy
ACSAC
2005
IEEE
14 years 4 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
JNW
2008
112views more  JNW 2008»
13 years 11 months ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
SIGCOMM
2004
ACM
14 years 4 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...
MTA
2008
132views more  MTA 2008»
13 years 11 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla