Sciweavers

2207 search results - page 118 / 442
» Security at the Internet Layer
Sort
View
ECOWS
2008
Springer
15 years 6 months ago
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
In this paper, we present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. We address a recent cryptogra...
Carlo Blundo, Emiliano De Cristofaro, Clemente Gal...
SAINT
2008
IEEE
15 years 10 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
AINA
2006
IEEE
15 years 10 months ago
Adaptive Timeout Policies for Wireless Links
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
George Xylomenos, Christos Tsilopoulos
IPTPS
2003
Springer
15 years 9 months ago
PeerNet: Pushing Peer-to-Peer Down the Stack
- An unwritten principle of the Internet Protocol is that the IP address of a node also serves as its identifier. We observe that many scalability problems result from this princi...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
MOBICOM
1999
ACM
15 years 8 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph