Sciweavers

2442 search results - page 397 / 489
» Secure Service Orchestration
Sort
View
ICEIS
2002
IEEE
14 years 2 months ago
Thin Servers - An Architecture to Support Arbitrary Placement of Computation in the Internet
: The Internet is experiencing an overwhelming growth that will have a negative impact on its performance and quality of service. In this paper we describe a new architecture that ...
Juan Carlos Diaz y Carballo, Alan Dearle, Richard ...
IH
2001
Springer
14 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
COMPSAC
2000
IEEE
14 years 2 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
IPPS
2000
IEEE
14 years 2 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
ICTAI
1999
IEEE
14 years 1 months ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref