Sciweavers

3418 search results - page 460 / 684
» Security for Grid Services
Sort
View
ICIW
2007
IEEE
14 years 5 months ago
E-Satisfaction - A Comprehensive Framework
As more and more e-retailers promise their customers that online experiences will be satisfying ones, understanding what creates a satisfying customer experience becomes crucial. ...
Akshay Anand
ACSAC
2005
IEEE
14 years 4 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
14 years 4 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
ICCS
2001
Springer
14 years 3 months ago
Capacity and Capability Computing Using Legion
Computational Scientists often cannot easily access the large amounts of resources their applications require. Legion is a collection of software services that facilitate the secur...
Anand Natrajan, Marty Humphrey, Andrew S. Grimshaw
ACSAC
2009
IEEE
14 years 2 months ago
RAD: Reflector Attack Defense Using Message Authentication Codes
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...