Sciweavers

819 search results - page 138 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SC
2004
ACM
14 years 23 days ago
Collaborative User-Centric Lambda-Grid over Wavelength-Routed Network
Emerging lambda-Grid systems employ wavelength-routed network with optical switches to enable dynamic on-demand lightpaths with multi-gigabit rate bandwidth to interconnect shared...
Oliver T. Yu, Thomas A. DeFanti
FAC
2007
128views more  FAC 2007»
13 years 7 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
JSAC
2007
189views more  JSAC 2007»
13 years 7 months ago
Non-Cooperative Power Control for Wireless Ad Hoc Networks with Repeated Games
— One of the distinctive features in a wireless ad hoc network is lack of any central controller or single point of authority, in which each node/link then makes its own decision...
Chengnian Long, Qian Zhang, Bo Li, Huilong Yang, X...
GLOBECOM
2009
IEEE
13 years 10 months ago
Protecting SIP against Very Large Flooding DoS Attacks
—The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol u...
Felipe Huici, Saverio Niccolini, Nico d'Heureuse
ICCS
2007
Springer
14 years 1 months ago
Healthcare Information Management System in Home Environment
The distributed object group framework (DOGF) enables easier integration of distributed objects to healthcare home applications. This paper describes a healthcare information manag...
Chang-Won Jeong, Chung-Sub Lee, Su-Chong Joo