Sciweavers

590 search results - page 48 / 118
» Security Issues in VOIP Applications
Sort
View
WWW
2008
ACM
14 years 8 months ago
Better abstractions for secure server-side scripting
bstractions for Secure Server-Side Scripting Dachuan Yu Ajay Chander Hiroshi Inamura Igor Serikov DoCoMo Communications Laboratories USA 3240 Hillview Avenue Palo Alto, CA 94304 {y...
Dachuan Yu, Ajay Chander, Hiroshi Inamura, Igor Se...
ATAL
2011
Springer
12 years 8 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
TKDE
2002
112views more  TKDE 2002»
13 years 7 months ago
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and ...
Chanjung Park, Seog Park, Sang Hyuk Son
COMSWARE
2007
IEEE
13 years 12 months ago
Efficient Design of End-to-End Probes for Source-Routed Networks
Migration to a converged network has caused service providers to deploy real time applications such as voice over an IP (VoIP) network. From the provider's perspective, the s...
Srinivasan Parthasarathya, Rajeev Rastogi, Marina ...
BELL
2002
86views more  BELL 2002»
13 years 7 months ago
Middleboxes: Controllable media firewalls
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...