Sciweavers

403 search results - page 23 / 81
» Secure multicast in dynamic environments
Sort
View
ICNS
2009
IEEE
13 years 5 months ago
Supporting High-Tech Crime Investigation through Dynamic Service Integration
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...
SIGCOMM
1996
ACM
13 years 11 months ago
Receiver-Driven Layered Multicast
State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-a...
Steven McCanne, Van Jacobson, Martin Vetterli
CCS
1998
ACM
13 years 11 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
CN
2008
111views more  CN 2008»
13 years 7 months ago
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
Overload control mechanisms such as admission control and connection differentiation have proven effective for preventing overload of application servers running secure web applic...
Jordi Guitart, David Carrera, Vicenç Beltra...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 5 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer