Sciweavers

2207 search results - page 29 / 442
» Security at the Internet Layer
Sort
View
149
Voted
ETM
2010
163views Economy» more  ETM 2010»
15 years 4 months ago
Estimating AS Relationships for Application-Layer Traffic Optimization
The relationships among autonomous systems (ASes) on the Internet are categorized into two major types: transit and peering. We propose a method for quantifying AS' network si...
Hirochika Asai, Hiroshi Esaki
134
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
139
Voted
WWW
2005
ACM
16 years 4 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
AH
2000
Springer
15 years 8 months ago
Layered Evaluation of Adaptive Applications and Services
In this paper we present an empirical study of the InterBook system to demonstrate the benefits of the layered evaluation framework, where the success of adaptation is addressed at...
Charalampos Karagiannidis, Demetrios G. Sampson
ICIW
2008
IEEE
15 years 10 months ago
A Secure Mobile Framework for m-Services
Spyridon Papastergiou, Athanasios Karantjias, Desp...